Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
PostDoc Professor Research, development, innovation Researcher Technical and laboratory You are signed up for the Job alert Previous Next Sign up Cookies We use cookies and similar technologies to process
-
research focuses on three key areas: Systems Security, Data Security, and AI Security (encompassing both Security of AI and AI-driven security). We are seeking a dynamic and ambitious researcher to develop
-
futures. It provides the Director General, the programme directorates and the broader Agency with insights and tools to set strategic goals, strengthen resilience and enable meaningful transformation. Using
-
Research (WBVR), you play a key role in a dynamic and evolving organization. In the coming years, we will implement new processes, replace existing systems, construct state-of-the-art facilities, and improve
-
when needed? And do you enjoy the dynamics of moving between strategic topics and being hands on when the situation requires it? Then this is the job for you! Job description The Business Consulting team
-
and 400 students, we are a dynamic, highly international and well-connected community. The UCG LAS program offers a small-scale and intensive broad Bachelor education with majors in three disciplines
-
degree in data science, computer science, business analytics or a similar field; Four to seven years of relevant experience in BI roles; Strong command of Power BI (including advanced DAX and data
-
Scientific Programmer Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 32 to 32 Application deadline: 3 September 2025 Apply now Does your
-
Location ESTEC, Noordwijk, Netherlands Description The ESA Programme Related to EU Secure Connectivity, hereinafter referred to as "Secure Connectivity", also "IRIS²", is intended to support the
-
) Earth Watch Programme Element in collaboration with EOP-S and other directorates as appropriate. You will initiate and manage the resulting activities for derisking and implementation when involving