Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
email at contact.human.resources@esa.int . Important Information and Disclaimer Applicants must be eligible to access information, technology, and hardware which is subject to European or US export
-
with a PhD in Human-Computer Interaction, Remote Sensing, Geo-Information Science, Cognitive Science, or a closely related field. The ideal applicant possesses a strong technical foundation, as
-
and join the EUR community. Stay up to date with new vacancies! Want to be the first to know about vacancies that match your interests? Let us know what you're looking for, and we'll send you an email
-
moving to Groningen. Unsolicited marketing is not appreciated. Information For information you can contact: Kathryn Knight, k.l.knight@rug.nl (please do not use the email addresses above for applications)
-
new vacancies! Want to be the first to know about vacancies that match your interests? Let us know what you're looking for, and we'll send you an email as soon as a new opportunity that fits your
-
, Associate Professor, by email: franzel.vanduijnhoven@wur.nl . Questions about the procedure? Get in touch with Rutger Voorrips, Corporate Recruiter, by email: rutger.voorrips@wur.nl . Ready to apply? Click
-
the workplace. The Human Resources Department can also provide assistance during the recruitment process. If you would like to discuss this further, please contact us via email at contact.human.resources@esa.int
-
research on the legal framework for digital identity wallets? As a Postdoctoral Researcher, you will focus on the requirements for the revision of the electronic IDentification, Authentication and trust
-
differentiation of generic and complex computer programs (including control flows, data structures, and possibly memory) allows for the exploitation of any-order differentials to obtain transformative effects
-
an estimated starting date; A publication list; The names and email addresses of two academic references who are willing to provide a reference letter upon request. A knowledge security check can be part of