Sort by
Refine Your Search
-
as cyberattacks target not only computers (e.g., malware) but also people (e.g., phishing). Furthermore, cybersecurity in organizations involves a team of experts who need to coordinate to effectively
-
) · Contact details of 2 references Please apply ONLINE formally through the HR system. Applications by email will not be considered. Application procedure and conditions We kindly request applicants to provide
-
, please apply by 31/05/2025 ONLINE formally through the HR system. Applications by Email will not be considered. All documents should be uploaded in PDF format. All qualified individuals are encouraged
-
of the project will not only strengthen his/her academic profile, but also give him/her access to (and the chance to critically engage with) some of the most renowned experts in the field. For more information