24 mining-engineering-scholarship Postdoctoral positions at Utrecht University in Netherlands
Sort by
Refine Your Search
-
on and contribute to a growing body of scholarship on queer of colour formations in Europe, especially in the Netherlands and the UK (e.g., Colpani and Isenia 2018; El-Tayeb 2011; Frank 2019, 2023; Kini
-
qualities You have a PhD in a computational field such as Artificial Intelligence, Computer Science or Software Engineering for Artificial Intelligence. You have a strong technical background in
-
can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. To apply, please send your curriculum
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are
-
13 Mar 2026 Job Information Organisation/Company Utrecht University Research Field Chemistry » Heterogeneous catalysis Chemistry » Inorganic chemistry Engineering » Chemical engineering Researcher
-
can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. To apply, please send your curriculum
-
can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. To apply, please send the following
-
this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. To apply, please send your curriculum vitae, including a letter of motivation, via the ‘apply now’ button
-
about the incoming projects and making use of the group’s expertise and technology to execute the projects effectively. While many of your projects will be initiated by collaborators, there is space and
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are