319 security-"https:"-"https:"-"https:"-"https:"-"Bournemouth-University" positions in Denmark
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background
-
irrespective of age, gender, disability, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export
-
Aalborg University may include a risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Read more about The
-
. The hiring process at Aalborg University may include a risk assessment as a tool to identify potential risks associated with new hires, ensuring the safety, compliance, and integrity of the workplace. Salary
-
teacher training a mentoring programme support to develop scientific networks and to secure interdisciplinary research at the highest level As part of the Aarhus University Tenure Track Programme, the
-
ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be
-
improvement and patient safety A strong and growing publication record Proven leadership in managing research teams and collaborative projects Success in securing competitive research funding Active involvement
-
background, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based
-
research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. Technology for
-
managing of Virtual Machines (VMs), and storage, Design secure and scalable CI/CD workflows, Support development and deployment pipelines, Ensure system reliability, maintainability, and compliance 2. Web