21 programming-"Multiple"-"Duke-University"-"Sun-Yat-Sen-University" positions at University of Adelaide
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
develop and implement a strategic plan for the Australian Defence Technologies Academy, fostering cutting-edge research and education in close collaboration with multiple internal and external stakeholders
-
to organise and complete multiple tasks simultaneously with close attention to detail and prioritisation to meet deadlines Experience using the Microsoft Suite to deliver high quality business documentation
-
administrative skills including database management and record keeping Proficient in using MS Office Suite and Microsoft Teams The ability to be self-organised to effectively prioritise multiple concurrent
-
experience with projects that overlap across multiple fields. The ability to plan and manage own research activity and conduct relevant individual and collaborative research projects. Good oral communication
-
research in high-quality, peer-reviewed journals, relative to opportunity An ability to work collaboratively with researchers from multiple disciplines, agronomists and growers Strong organisational
-
-of-the-art facilities at Adelaide Microscopy, including multiple transmission electron microscopes (TEM) such as a Glacios 200 kV Cryo-TEM. Additionally, resources available include the Phoenix high
-
research, including experimental design, execution and manuscript writing across multiple projects. The path to Adelaide University We are on an exciting path to Adelaide University as we prepare to open our
-
. Multiple full-time, continuing positions available Opportunity to use your passion for talent attraction, student recruitment, or sales, to build domestic student recruitment pipelines for the University and
-
analysis. This role will be pivotal in advancing our ability to measure novel traits in field and controlled environments by implementing current best practices and proposing a program of targeted research
-
for these models are then used to generate, check, verify and correct network/device configurations for correctness and security issues. The same framework will also be used to predict and plan security