Sort by
Refine Your Search
-
Listed
-
Program
-
Employer
-
Field
-
Prior experience in protein expression in industrially relevant hosts, e.g. Bacillus spp. or Pseudomonas spp. Strong skills within data analyses and representation. As a formal qualification you must hold
-
Municipalities, which is funded by the Velux Foundation. Read Velux’s presentation of the project at: https://veluxfonden.dk/en/projekt/migrant-solidarity-network-local-dynamics-civil-society-and-municipalities
-
background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted
-
in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. About DTU Aqua DTU
-
Job Description Are you excited about information security and the novel possibilities opened up by quantum technology? Are you fascinated by quantum physics and intriguing phenomena such as quantum
-
Department of Physics at https://physics.dtu.dk/ . If you are applying from abroad, you may find useful information on working in Denmark and at DTU at DTU – Moving to Denmark . Application procedure Your
-
visit us on LinkedIn: https://www.linkedin.com/company/sdu-robotics . If you experience technical problems, you must contact hcm-support@sdu.dk . Further information for international applicants about
-
for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU Compute DTU Compute – Department of Mathematics and Computer Science – is an
-
the safety, compliance, and integrity of the workplace. Salary and terms of employment The employment is in accordance with the Ministerial Order on the Appointment of Academic Staff at Universities
-
for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open