Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
sciences » Public policy Sociology » Social shaping of technology Sociology » Societal behaviour Researcher Profile Recognised Researcher (R2) First Stage Researcher (R1) Application Deadline 20 Feb 2026
-
(Git/GitHub). Ideally with experience developing (open-source) software or collaborating with research engineers for that purpose. Has broad/generalist knowledge on statistical modelling, with additional
-
). Ideally with experience developing (open-source) software or collaborating with research engineers for that purpose. Has broad/generalist knowledge on statistical modelling, with additional conceptual
-
technology. To apply, please send your curriculum vitae, including a letter of motivation, via the ‘apply now’ button. Please note that international candidates that need a visa/work permit for the Netherlands
-
, to prevent the unwanted transfer of sensitive knowledge and technology. To apply, please send your curriculum vitae, including a letter of motivation, via the ‘apply now’ button. The application deadline is 3
-
the unwanted transfer of sensitive knowledge and technology. Interested in applying? Please submit the following documents via the ‘apply now’ button. your curriculum vitae; your cover letter; the contact
-
contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. To
-
contributing to biomedical translation and the transition to animal-free research and innovation. As an ideal candidate you have a background in innovation or transition studies, science and technology studies
-
do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are enthusiastic about this position, apply via the "Apply now" button! Please enclose: a one
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are