Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
- Linköping University
- KTH Royal Institute of Technology
- Chalmers University of Technology
- Lunds universitet
- SciLifeLab
- University of Lund
- KTH
- Lulea University of Technology
- Swedish University of Agricultural Sciences
- Uppsala universitet
- Blekinge Institute of Technology
- Umeå University
- Örebro University
- Linköpings universitet
- Luleå university of technology
- Nature Careers
- Umeå universitet
- Karlstads universitet
- Luleå University of Technology
- Högskolan Väst
- IFM, Linköping University
- IFM/Linköping University
- Jönköping University
- Karolinska Institutet, doctoral positions
- LInköpings universitet
- Lule university of technology
- Luleå tekniska universitet
- Malmö university
- Mälardalen University
- University of Gothenburg
- 20 more »
- « less
-
Field
-
security-sensitive role in accordance with the Protective Security Act (2018:585). If this applies to the specific position, a security clearance will be conducted for the applicant in accordance with
-
Technology at Lund University, The Faculty of Engineering, LTH, is unique in covering the entire communication technology stack — from wireless hardware and radio systems to networked applications and secure systems
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
career step after a dissertation. Others For information about processing of personal data in the recruitment process. It may be the case that a position at KTH is classified as a security-sensitive role
-
fundamental values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
background, the teaching may be centred around cybersecurity (e.g., penetration testing, usable security, ICS/OT security, incident response, digital forensics, etc.), information security (e.g., risk
-
challenges of today. Our fundamental values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We
-
of today. Our fundamental values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look