Sort by
Refine Your Search
-
meaningful public and patient involvement in health and social care research. The successful candidate will work closely with our Programme Manager and collaborate with a national team including Programme
-
mentoring. • Assist with funding proposals and bidding of projects. • Day to day project management including data curation and processing, technical reporting, procurement, health and safety compliances, and
-
, the management team, and a dedicated group of research scientists, research assistants and postgraduate students. We are currently recruiting a post-doctoral researcher to work within the ERC Advanced project
-
have responsibility for undertaking research activities under the management of the PI or nominee representing UCC’s role in the HCI funded project MicroCreds with a focus on inclusion. The role consists
-
is a Principal Investigator and Deputy Director. We are now looking for a Post Doctoral researcher to join the team and participate in our vibrant research community. gVID is a new 2-year project
-
supportive care needs, and enhance quality of life. Co-developed with survivors, care partners, and healthcare professionals, TRANSCEND-XR will be evidence-based, ethically grounded, and scalable in real-world
-
administration as well as training and career development opportunities. The work will be carried out under the direction of the PI with support from the project team. Further details about the CyberSocial
-
wind technologies. The successful candidate will work closely with an experienced mentor who specializes in the development of simulation tools and the management of logistics and financial scenarios
-
, scale, and/or impact, but they typically share common challenges in how best to manage these incidents. How we gather, share and ultimately use data and information in a timely fashion in order to help
-
the CFD component of the DETECT project and support other aspects of the project (management, reporting and fieldwork). The overall project aims to assess coastal vulnerability and model it using a