38 computer-programmer-"Diamond-Light-Source"-"Diamond-Light-Source" positions at Nature Careers in Belgium
Sort by
Refine Your Search
-
in a dedicated training plan For further information, please contact Prof. Marcus Völp at critix- Your profile Qualification: Master in Computer Science and/or Cybersecurity or equivalent degrees with
-
Participate in a dedicated training plan For further information, please contact Prof. Marcus Völp at critix- Your profile Qualification: PhD in Computer Science Experience in dependable systems, real-time and
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
postdoctoral-level candidate with specialization in bioinformatics or computational biology approaches, with special preference for single-cell analyses. The teams of Prof. Garg and Prof. Naulaerts aim to apply
-
for artificial intelligence in life sciences, we benefit from high-throughput computing infrastructure to support advanced data analysis and integration. Profile We are looking for a motivated postdoctoral
-
(FSTM) at the University of Luxembourg contributes multidisciplinary expertise in the fields of Mathematics, Physics, Engineering, Computer Science, Life Sciences and Medicine. Through its dual mission
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular