41 computer-security "https:" "https:" "https:" "https:" "https:" uni jobs at University of Glasgow
Sort by
Refine Your Search
-
regenerative power can lead to diseases like cancer, with far reaching impact to overall health.The Tissue Regeneration and Cancer MSc Research Programme, hosted by the School of Cancer Sciences, will deliver
-
authentication services) to ensure secure, efficient data delivery. 3. Support UBDC researchers with ad hoc technical tasks relating to dataset generation, model development, and analysis. 4. Database
-
are currently seeking enthusiastic students who are either planning to apply for scholarships or have already secured funding from their home countries or other research organisations. If this project intrigues
-
identification of potential funding sources and assist in the development of proposals to secure funding from internal and external bodies, planning and developing a line of research activities. Take a leading
-
Fully funded Wellcome Trust Integrative Infection Biology PhD programme Immunology research includes cytokine and chemokine biology, immune cell signalling, advanced imaging technologies, and
-
analysis, and machine learning. The successful candidate will join the dynamic and collaborative research environment of the CRUK Beatson Institute, working with a diverse multidisciplinary team of computer
-
International Review of Cell and Molecular Biology (Elsevier, 2018; https://linkinghub.elsevier.com/retrieve/pii/S1937644817300825)vol. 335, pp. 41–84. The molecular basis of cell self-renewal and pluripotency in
-
identification of potential funding sources and to assist the PI in the development of proposals to secure funding from internal and external bodies to support future research. 7. Take a leading role in developing
-
to develop and enhance our research and/or impact profile. 6. Take a leading role in the identification of potential funding sources and to assist in the development of proposals to secure funding from
-
to business as usual is as seamless as possible. 6. Compliance and Security: Working closely with the Chief Information Security Officer (CISO) ensure all services are compliant with cyber security