65 security-"https:" "https:" "https:" "https:" "UCL" positions at University of Southern Denmark
Sort by
Refine Your Search
-
research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background checks may
-
unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background checks may be conducted on candidates for the position(s). Further
-
research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background checks may
-
security measures. Therefore, based on information from open sources, background checks may be conducted on candidates for the position(s). Further information for international applicants about entering
-
Jesper Hallas and Anton Pottegård. It comprises approx. 45 individuals and focuses on registry-based research covering all aspects of drug use, drug effects, and drug safety. The group is highly regarded
-
assist with experimental planning Handle biological samples, including preclinical material, in accordance with ethical and safety regulations Contribute to the daily organization of the infrastructure
-
The following qualifications and skills are strong assets: - Proven experience operating drones for at least 5 years - Strong knowledge of drone safety regulations and compliance requirements - Experience with
-
conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background
-
, regardless of personal background, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures
-
for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources