206 security-"https:" "https:" "https:" "https:" "Robert Gordon University" uni jobs in Denmark
Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
managing of Virtual Machines (VMs), and storage, Design secure and scalable CI/CD workflows, Support development and deployment pipelines, Ensure system reliability, maintainability, and compliance 2. Web
-
research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. Technology for
-
the safety, compliance, and integrity of the workplace. Salary and terms of employment The employment is in accordance with the Ministerial Order on the Appointment of Academic Staff at Universities
-
may include a risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Salary and terms of employment
-
Aalborg University may include a risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Salary and terms
-
University may include a risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Salary and terms of employment
-
leading role in the department’s cross-cutting activities. These activities may include mentoring of junior faculty, developing and directing interdisciplinary research groups, securing external research
-
irrespective of age, gender, disability, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export
-
for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU National Food Institute DTU National Food Institute conducts research into and
-
background, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based