153 security-"https:" "https:" "https:" "https:" "Helmholtz Zentrum Dresden Rossendorf" positions at Cardiff University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
- Cyber Security Engineer – Cyber Innovation Hub School of Computer Science & Informatics College of Physical Sciences and Engineering An exciting new opportunity has arisen for a full‑time Cyber Security
-
attractive benefits to its employees, including a competitive salary, 37 days annual leave per annum and a generous pension scheme. More information on what we can offer can be found at https
-
, e.g., by nationality (British Citizen) or 5+ years UK residency etc. Eligibility criteria and further information on the process can be found on the UK Government security vetting website, see https
-
will enhance performance. To ensure that an understanding of the importance of confidentiality is applied when undertaking all duties To abide by the University policies on Health and Safety and Equality
-
research are encouraged to apply. Informal enquiries should be made to Dr. Wiola Zelek (zelekw@cardiff.ac.uk ). Division: http://medicine.cf.ac.uk/infect-immun/ UK DRI Cardiff: https://ukdri.ac.uk/centres
-
Business Intelligence development team. The BI Development team designs, builds and maintains the University’s core business intelligence and data warehousing capabilities, delivering reliable, secure and
-
performance. To ensure that an understanding of the importance of confidentiality is applied when undertaking all duties. To abide by University policies on Health and Safety, Equality and Diversity and data
-
Business Intelligence development team. The BI Development team designs, builds and maintains the University’s core business intelligence and data warehousing capabilities, delivering reliable, secure and
-
be found on our home page: http://www.cardiff.ac.uk/socsi Job Category Academic - Research
-
one of the top 100 universities in the world and the top 20 in the UK. Ensuring the security of our research, teaching and administrative systems and their data from theft, compromise and corruption is