Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
Ireland. You MUST upload a copy of your current Visa and Work permit in the attachments section application form, or your application will not be processed. Please note your current work authorisation
-
to work and reside in Ireland. You MUST upload a copy of your current Visa and Work permit in the attachments section application form, or your application will not be processed. Please note your current
-
to forward a copy of your CV along with your academic referees. Informal enquiries to:Colin.clarke@nibrt.ie or niall.barron@nibrt.ie Funding:Annual stipend of €25,000 plus fees for 4 years.Project 2: Model
-
MUST upload a copy of your current Visa and Work permit in the attachments section application form, or your application will not be processed. Please note your current work authorisation status must
-
. that can be integrated within a selected ABM framework. This model will be evaluated using existing data and used to simulate GHG emissions under different policy scenarios. The successful candidate will
-
and reside in Ireland. You MUST upload a copy of your current Visa & Work permit in the attachments section application form, or your application will not be processed. Please note your current work
-
upload a copy of your current Visa and Work permit in the attachments section application form, or your application will not be processed. Please note your current work authorisation status must allow you
-
Ireland. You MUST upload a copy of your current Visa and Work permit in the attachments section application form, or your application will not be processed. Please note your current work authorisation
-
currently legally entitled to work and reside in Ireland? If you are not currently an EEA Citizen and have stated you are currently legally entitled to work and reside in Ireland. You MUST upload a copy of
-
) domain-oriented cyber ranges for training and exercises, incorporating sophisticated methods and techniques for simulation of users, analysis of the performance of the cyber operators, and scoring cyber