Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
, you will transfer to the salary-earning part of the scholarship for a period of two years. At that point, the terms of employment and payment will be according to the agreement between the Ministry of
-
portion is DKK 6,243. When you have obtained the MSc degree, you will transfer to the salary-earning part of the scholarship for a period of two years. At that point, the terms of employment and payment
-
7,086 before tax. When you have obtained the MSc degree, you will transfer to the salary-earning part of the scholarship for a period of two years. At that point, the terms of employment and payment will
-
, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information
-
encourages everyone, regardless of personal background, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number
-
conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background
-
conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background
-
focus on teaching activities although you must contribute to teaching courses. In the DTU tenure track, after a maximum period of six years, researchers are evaluated and may be transferred to a permanent
-
, the doctoral network aims to provide extensive training in research and transferable skills, centred around annual workshops in Dublin (IE), Dübendorf (CH), Copenhagen (DK) and Bochum (DE). Besides this, your
-
conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background