Sort by
Refine Your Search
-
research projects, providing qualitative and mixed methods process evaluations. This is an exciting opportunity for someone who is on their way to becoming an independent researcher as there will be scope
-
, microstructure and mechanical properties characterization of the cast samples. In-situ and real-time studies of the fundamentals of liquid melt filling and solidification processes under different casting
-
balance within DAIM. Required: Ideally you will hold a good degree, and a PhD or equivalent (or have submitted your PhD prior to commencement), with experience in teaching and research. We also recognise
-
towards one if successful. Ideally, we would like to appoint someone who may have or be about to complete their PhD, Or have considerable teaching or practice experience in the areas identified and may be
-
degree (PhD, MD, or equivalent) and either hold MRCGP and have completed their clinical training, or be a specialist /speciality registrar. Candidates may only apply if they have already submitted
-
actively participating in team discussions to contribute to project planning, findings, and future actions. About you The successful candidate will hold an MSc or PhD in a relevant discipline such as
-
Funding Coordinator provides subject matter expertise and leadership in three areas: student financial awards, applicant enquiry management and non-standard application processing. The role is part of a
-
external stakeholders including industry partners and professional institutions (e.g., IET, IEEE). Person Specification Essential: A PhD in Electrical Engineering or a closely related field Demonstrable
-
, including taught MSc courses, MSc by Research and PhDs. Our teaching is gold standard, evidenced by the most recent Teaching Excellence Framework rating. Our staff and students are committed to fostering
-
are particularly interested in candidates with expertise in Cyber Security or Computer Graphics: Cyber Security: We are preparing to launch an exciting new undergraduate programme in Cyber Security. The successful