322 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "U.S" "St" "St" positions at University of Glasgow
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Linguistics
- Economics
- Medical Sciences
- Mathematics
- Computer Science
- Biology
- Materials Science
- Arts and Literature
- Business
- Humanities
- Science
- Sports and Recreation
- Engineering
- Psychology
- Earth Sciences
- Education
- Environment
- Philosophy
- Social Sciences
- Chemistry
- Electrical Engineering
- Law
- 12 more »
- « less
-
a professional and welcoming reception environment. 2. Operational Support - Assist with booking meeting rooms and managing space access systems (e.g., security cards). - Maintain stationery and
-
Matthew Self (Principal Investigator). The post holder will make essential contributions to a research programme focused on understanding the function of feedback projections in the visual cortex
-
. Contribute to the identification of potential funding sources and to assist in the development of proposals to secure funding from internal and external bodies to support future research. 6. Collaborate with
-
within veterinary neurology in accordance with established programme. 9. To support the development of creative and innovative approaches to teaching and learning, in accordance with the University's
-
We invite applications from Computational Biologists to complement and enhance the existing strengths of the Centre for Immunobiology and the School of Infection and Immunity at the University
-
- pensions handbook https://www.gla.ac.uk/myglasgow/payandpensions/pensions/, benefits and discount packages. 3 A flexible approach to working. 4 A commitment to support your health and wellbeing, including a
-
Student experience https://www.youtube.com/watch?v=oCXutRm1wc8 Study options Study options PhD: 3 years full-time; 5 years part-time MPhil: 1 year full time; 2 years part-time Also see our online Doctorate
-
element as appropriate, in accordance with the project objectives. This will involve using linked administrative datasets and working in a secure data environment which requires high levels of data security
-
software. 9. Apply the principles of security by design, adhering to security policies and running security tests according to established working procedures. 10. Ensure continued familiarisation with
-
stages that the system delivered will meet user requirements and expectations. 3. Ensure appropriate data architecture, security models, and integrations with university systems, ensuring data