301 information-security-"https:"-"https:"-"https:"-"https:"-"https:" positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
- European Space Agency
- Utrecht University
- University of Twente
- Erasmus University Rotterdam
- KNAW
- Radboud University
- Leiden University
- Eindhoven University of Technology (TU/e)
- Wageningen University & Research
- Delft University of Technology (TU Delft)
- Eindhoven University of Technology
- Nature Careers
- Tilburg University
- University of Twente (UT)
- Vrije Universiteit Amsterdam (VU)
- ;
- DIFFER
- Holomicrobiome Institute
- Maastricht University (UM)
- NIOZ Royal Netherlands Institute for Sea Research
- Radboud University Medical Center (Radboudumc)
- Radix Trading LLC
- University of Amsterdam (UvA)
- 13 more »
- « less
-
Field
-
be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process of transitioning to a Matrix setup, which
-
communities. Your job Public debates on migration are frequently framed as confrontations between ‘pro’ and ‘anti’ positions. Such framings can undermine social cohesion by reinforcing the idea that society is
-
construction or refurbishment projects, including budgeting and contractor oversight. Familiarity with health, safety, and environmental regulations. Diversity, Equity and Inclusiveness ESA is an equal
-
description: The current overlapping crises - political polarization, the climate, and security fears - present challenges for mental health and well-being. Engaging in collective action is one way to cope, but
-
basic screening before appointment, which will be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process
-
be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process of transitioning to a Matrix setup, which
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
researcher, you will engage with students and staff to collect rich data, perform qualitative analyses, co-author open-access papers, and co-create a dilemma game – a reflective tool for teachers, support
-
policy relevance. Your research will contribute to academic debates and inform public decision-making on flood risk management and climate adaptation. Your duties and responsibilities include: Developing
-
, and security fears - present challenges for mental health and well-being. Engaging in collective action is one way to cope, but research shows it can also be exhausting and increase sensitivity