53 information-security "https:" "https:" "UCL" uni jobs at UNIVERSITY OF EAST LONDON
Sort by
Refine Your Search
-
2026 Reference 0548-26-S University of East London We’re the University of East London (UEL) founded in 1898 and proud to change lives through education. Our goal is to advance industry 5.0 careers-first
-
Friday 20 March 2026 Reference 013S2026 University of East London We are the University of East London (UEL) founded in 1898 and proud to change lives through education. Our goal is to advance industry 5.0
-
populations, is representative and inclusive, enabling all to progress and thrive. Where to apply Website https://www.timeshighereducation.com/unijobs/listing/408242/lecturer-supervisin… Requirements Additional
-
values diversity in both our staff and student populations, is representative and inclusive, enabling all to progress and thrive. Where to apply Website https://www.timeshighereducation.com/unijobs/listing
-
University of East London (UEL) , our mission is to prepare students for the careers of the future while shaping that future inclusively and sustainably. As a careers-first university, we believe education and
-
London’s Halls of Residence. This role helps ensure our accommodation is safe and welcoming by assisting with estate operations, health and safety compliance, and customer service delivery. You will be
-
16 March 2026 Interview Date To be confirmed Reference 2437-25-PS-R At the University of East London (UEL) , our mission is to prepare students for the careers of the future while shaping that future
-
Samsung products, holidays, clothing, fitness, lifestyle, dining out and weekly shopping. https://uel.ac.uk/benefits-all-academic-positions Equal Opportunities UEL is an inclusive, equal opportunities
-
adaptability required for the future world of work. We are passionate about diversity, inclusion, and sustainability, and about creating opportunities for talent wherever it is found. Our vibrant and inclusive
-
, driving the implementation of key ITIL initiatives. A proactive approach to ensuring the security of database and integration technologies is essential, including the design and execution of vulnerability