Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
Postdoctoral Researcher in Citizen Science & Societal Engagement for an Inclusive Energy Transition,
interdisciplinary education and (new) scientific knowledge. Whether it is terrorism, security, artificial intelligence or a governance solution to the housing crisis, contemporary issues are comprehensively
-
processing chain electronics*; onboard data transfer interfaces, buses and associated protocols (high, medium and low speed); platform data handling functions related to security, data authentication
-
candidates will need to undergo basic screening before appointment, which will be conducted by an external background screening service, in compliance with the European Space Agency's security procedures
-
basic screening before appointment, which will be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. The information published
-
and economics, the functioning of the labor market, and social security. The department provides courses for a number of study programs, such as public administration, liberal arts, and law. Moreover
-
, avionics systems, systems engineering and integration, mechanical systems, assembly, integration and testing, product assurance and safety, and security. The Team interacts closely with academia and the
-
an estimated starting date; A publication list; The names and email addresses of two academic references who are willing to provide a reference letter upon request. A knowledge security check can be part of
-
an external background screening service, in compliance with the European Space Agency's security procedures. The information published on ESA’s careers website regarding working conditions is correct
-
an external background screening service, in compliance with the European Space Agency's security procedures. The information published on ESA’s careers website regarding working conditions is correct
-
’ (asking for too many attributes). In this light, there is a tension between security (authentication, obtaining certainty about the user and its attributes) and data protection. Moreover, the specific use