Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Delft University of Technology (TU Delft)
- Delft University of Technology (TU Delft); Delft
- Delft University of Technology (TU Delft); yesterday published
- University of Amsterdam (UvA)
- University of Groningen
- Delft University of Technology (TU Delft); today published
- Leiden University
- Radboud University
- University of Amsterdam (UvA); Amsterdam
- Eindhoven University of Technology (TU/e)
- University of Amsterdam (UvA); yesterday published
- University of Twente (UT)
- Eindhoven University of Technology (TU/e); yesterday published
- Leiden University; 's-Gravenhage
- University of Amsterdam (UvA); today published
- University of Groningen; Groningen
- Delft University of Technology
- Delft University of Technology (TU Delft); 10 Oct ’25 published
- Delft University of Technology (TU Delft); 3 Oct ’25 published
- Eindhoven University of Technology (TU/e); 4 Oct ’25 published
- Erasmus University Rotterdam
- Leiden University; today published
- Maastricht University (UM)
- Maastricht University (UM); 26 Sep ’25 published
- Radboud University; yesterday published
- The Open Universiteit (OU)
- The Open Universiteit (OU); today published
- Tilburg University
- Universiteit van Amsterdam
- University Medical Center Utrecht (UMC Utrecht)
- University Medical Center Utrecht (UMC Utrecht); today published
- University of Amsterdam (UvA); 10 Oct ’25 published
- University of Twente
- University of Twente (UT); 26 Sep ’25 published
- Wageningen University and Research Center
- 25 more »
- « less
-
Field
-
: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do
-
Requirements . Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment
-
: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new cybersecurity solutions”, we are looking for a PhD candidate
-
-users and teams (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new cybersecurity solutions”, we are looking for a PhD candidate
-
note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do
-
. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and
-
demonstrates your academic writing skills; The name and email address of an academic reference who is willing to provide a reference letter upon request. A knowledge security check can be part of the selection
-
PhD position in organisational cybersecurity: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new
-
PhD in organisational cybersecurity: End-users and teams (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new cybersecurity
-
resources needed to deploy DPPs will be challenged. Its technical legitimacy depends on the reliability of the global DPP infrastructure: is the data completely, accurately and securely stored and transmitted