Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
electron microscopy methods in the lab including single particle analysis cryo-EM, cryo-CLEM, cryoFIB/SEM and cryo-ET. The job involves work in the EMBION cryo-EM facility as applications specialist in cryo
-
Researcher (R1) Recognised Researcher (R2) Positions PhD Positions Application Deadline 10 May 2026 - 12:00 (Europe/Copenhagen) Country Denmark Type of Contract Permanent Job Status Full-time Offer Starting
-
mineralisation in the Faroe Islands. The candidate will also be responsible for analysing the data and writing a research article. As a formal qualification, you must hold a PhD degree (or equivalent). Eligible
-
expected to master both. As formal qualification you must hold a PhD degree (or equivalent). You will be assessed against the responsibilities and qualifications stated above and the following general
-
are expected to be fluent in at least one of these languages, and in time are expected to master both. As a formal qualification you must hold a PhD degree (or equivalent). If you are applying
-
formal qualification you must hold a PhD degree (or equivalent). If you are applying for the associate professor position you should also have academic qualifications equivalent to those obtained by
-
(industry, grid operators, regulators) and an interest in societal impact pathways As a formal qualification, you must hold a PhD degree (or equivalent). You will be assessed against the responsibilities and
-
are expected to be fluent in at least one of these languages, and in time are expected to master both. As a formal qualification you must hold a PhD degree (or equivalent). If you are applying
-
memorization in LLMs Analysis of vulnerabilities in low-resource language settings, and the effect of typological diversity on the security landscape in multilingual settings Formal semantic or symbolic methods
-
penetration testing (ethical hacking) Formal methods for security Human-centered cybersecurity Privacy and privacy enhancing technologies Security engineering Hardware security Security in pervasive computing