307 security-"https:"-"https:"-"https:"-"https:"-"Leeds-Beckett-University" positions in Denmark
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
behavior in absorption–desorption cycles Strong documentation skills, with experience preparing technical reports, experiment logs, and safety documentation Strong problem-solving mindset and the ability
-
of common semiconductor materials like silicon, various oxides and metals Experience and understanding regarding cleanroom, chemical and electrical safety Proven leadership experience, including
-
in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU Civil and
-
to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU National Food Institute DTU National Food Institute
-
public – try to influence perceptions of regime strength, durability, and resolve among their supporters and opponents to secure and consolidate their position. The project analyzes both rhetorical and
-
international researchers in the field. This includes participation in securing external research funding and having spent a period conducting research at one or more recognised research institutions. At the time
-
Chemical Engineering, we are looking for a detail-oriented development engineer to secure our daily operation of our pilot at industrial sites. Our projects include, among other areas, CO2 capture and
-
identifying and securing funding for startup initiatives and applied innovation projects. Within a technical development environment, your responsibilities will include overseeing electronic engineering
-
, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background
-
critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background checks may be