Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The Research group Governance of Cyber Security at the Institute of Security and Global Affairs (ISGA) is
-
funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The Intelligence and Security Research Group at the Institute of Security and Global
-
institute to conduct research on the labour market and social security in the Netherlands. Potential subjects include trends and developments in sickness absenteeism and incapacity for work, labour market
-
assessment within defence contexts, while also contributing to the academic literature on cyber security analytics. Where to apply Website https://www.academictransfer.com/en/jobs/359873/postdoctoral-position
-
three main themes: the energy transition, sustainable aerospace, and safety and security, with the aim of tackling climate change and contributing to the independence and security of Europe. When you join
-
examine affective metrics such as perceived safety, comfort, and opportunities for social interaction. The outcomes are synthesized into integrated multidisciplinary solutions that combine data-driven
-
activity/research for the traineeship The European Space Agency is seeking a Research Fellow to advance innovative resilience and security applications that leverage the combined strengths of Earth
-
. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and
-
knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. The
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are