20 programming-"Multiple"-"Prof"-"FEMTO-ST-institute"-"St"-"UCL"-"U" positions at University of Adelaide
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
% superannuation applies. Fixed term, full time position for 24 months. This position is based within the University of Adelaide’s barley research program, located in the School of Agriculture, Food and Wine (Waite
-
and timely business outcomes. High level organisational skills including strong attention to detail, the ability to complete tasks end to end and to manage multiple priorities within tight timelines
-
project delivery and stakeholder engagement. . This position is responsible for coordinating multiple workstreams, facilitating effective collaboration across diverse internal and external groups, and
-
an employer contribution of up to 17% superannuation applies. Multiple fulltime fixed term opportunities, available until end of March 2026. Join The University of Adelaide during a time of exciting growth as
-
an organisation. Knowledge of budgeting and resource allocation procedures. Excellent time management skills, with a demonstrated ability to respond to changing priorities, manage multiple tasks and meet competing
-
develop and implement a strategic plan for the Australian Defence Technologies Academy, fostering cutting-edge research and education in close collaboration with multiple internal and external stakeholders
-
experience with projects that overlap across multiple fields. The ability to plan and manage own research activity and conduct relevant individual and collaborative research projects. Good oral communication
-
administrative skills including database management and record keeping Proficient in using MS Office Suite and Microsoft Teams The ability to be self-organised to effectively prioritise multiple concurrent
-
-of-the-art facilities at Adelaide Microscopy, including multiple transmission electron microscopes (TEM) such as a Glacios 200 kV Cryo-TEM. Additionally, resources available include the Phoenix high
-
for these models are then used to generate, check, verify and correct network/device configurations for correctness and security issues. The same framework will also be used to predict and plan security