Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
, including policies, infrastructure, technology, safety, economic incentives, and public acceptance. You will be involved in three specific subprojects: Analyzing the employment effects of the green transition
-
application to Prof. dr. M.T.J. Spaan. Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during
-
number 101070254, within program H2020 You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the
-
and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive
-
the Netherlands and across Europe. The programme addresses the system-wide conditions required to enable a successful hydrogen transition, including policies, infrastructure, technology, safety, economic incentives
-
application to Dr. Swapna Ganapathy and Prof. Marnix Wagemaker. Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a
-
. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and
-
funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The Research group Diplomacy and Global Affairs at the Institute of Security and Global
-
knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. The
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are