52 security-"https:"-"https:"-"https:"-"Technical-University-Of-Denmark" PhD positions in Denmark
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Read more about The Doctoral School in Medicine, Biomedical Science and Technology Salary and terms
-
or not. The hiring process at Aalborg University may include a risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the Read
-
unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background checks may be conducted on candidates for the position(s). Further
-
or not. The hiring process at Aalborg University may include a risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity
-
research infrastructure and lab facilities to conduct world-leading fundamental and applied research within communication, networks, control systems, AI, sound, cyber security, and robotics. The department
-
risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Read more about The Doctoral School of Engineering and
-
before the appointment is announced. As an applicant to the University of Copenhagen, you should be prepared to undergo a security screening related to international research collaboration as part of
-
Jesper Hallas and Anton Pottegård. It comprises approx. 45 individuals and focuses on registry-based research covering all aspects of drug use, drug effects, and drug safety. The group is highly regarded
-
tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Read more about The Doctoral School of Engineering and Science Salary and
-
for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources