184 machine-learning "https:" "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" positions at University of Manchester in United Kingdom
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
The postholder will lead Phase 2 evaluation and learning capture for the Breaking Barriers programme, working closely with the project leads to design and deliver a mixed-methods evaluation across
-
flexible working, career breaks and entitlement to paid maternity, paternity and adoption leave. For more details on these and other benefits see http://www.manchester.ac.uk/connect/jobs/benefits-working
-
: people.recruitment@manchester.ac.uk Technical support: Email: https://jobseekersupport.jobtrain.co.uk/support/home This vacancy will close for applications at midnight on the closing date Please see the link below
-
for its research and its innovative approach to learning, with an on-going £1 billion investment in facilities, staff and buildings. This builds on our tradition of success that stretches back 200 years
-
, fitness and leading sports facilities. Learning and development opportunities. Season ticket loans for public transport. Workplace nursery scheme. Staff recognition schemes. Staff discounts on a range of
-
: Christopher Hardacre Email: c.hardacre@manchester.ac.uk General enquiries: Email: recruitmentservices.people@manchester.ac.uk Technical support: https://jobseekersupport.jobtrain.co.uk/support/home This vacancy
-
lab manual, mission statement, and current research topics please visit: http://whelanlab.co.uk What you will get in return: Fantastic market leading Pension scheme Excellent employee health and
-
the relevant information for the clearance process. Please see the security vetting link from UK Government on requirements. https://www.gov.uk/government/publications/united-kingdom-security-vetting-clearance
-
¿ For details, see: https://www.manchester.ac.uk/study/postgraduate-research/golden/melbourne/ Contact details for enquiries Useful links Back to list of opportunities
-
attacks or data leaks. This is particularly concerning given how widespread and security-critical these devices are: they are used for controlling vital computer systems in many domains, such as critical