175 data-"https:" "https:" "https:" "https:" "https:" "https:" "https:" "UNIV" uni jobs at University of Manchester
Sort by
Refine Your Search
-
Listed
-
Field
-
of terrestrial and extra-terrestrial materials. You can find out more about the research group at https://sites.manchester.ac.uk/planetary-science/. The post is funded by an STFC Small Award awarded
-
of a new secure research data platform, and potentially others, similar to the Data Safe Haven (https://ri.itservices.manchester.ac.uk/dsh/). In particular: they will lead in architecting, testing and
-
Tyne Email: rebecca.tyne@manchester.ac.uk General enquiries: Email: recruitmentservices.people@manchester.ac.uk Technical support: https://jobseekersupport.jobtrain.co.uk/support/home This vacancy will
-
, shortlisting and interviews: Name: Judith Apsley Email: j.apsley@manchester.ac.uk General enquiries: Email: recruitmentservices.people@manchester.ac.uk Technical support: https://jobseekersupport.jobtrain.co.uk
-
leave. For more details on these and other benefits see http://www.manchester.ac.uk/connect/jobs/benefits-working-here/. The Department is fully committed to Athena SWAN principles to promote women in
-
Alzheimer’s Research UK. This innovative project will characterise white matter defects in a newly described zebrafish model of COL4A1-related cerebral small vessel disease (cSVD) (https://doi.org/10.1016
-
vacancy, shortlisting and interviews: Name: Ed Baker Email: Ed.Baker@manchester.ac.uk General enquiries: Email: recruitmentservices.people@manchester.ac.uk Technical support: https
-
support: 0161 850 2004 https://jobseekersupport.jobtrain.co.uk/support/home This vacancy will close for applications at midnight on the closing date. Please see the link below for the Further Particulars
-
studies of jets, bubbles and air entrainment in complex fluids. The work will involve designing and running experiments, using high-speed imaging and rheological characterisation techniques, analysing data
-
attacks or data leaks. This is particularly concerning given how widespread and security-critical these devices are: they are used for controlling vital computer systems in many domains, such as critical