Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
activities will include: Building expertise: you will map out the regulatory ecosystem surrounding NAMs used for biomedical translation and the safety assessment of medicinal products. You will develop
-
, trauma, anxiety, CBT, and hormonal influences on mental health, with the aim of securing follow-up funding and extending the position. Your qualities We are looking for an ambitious and independent
-
activity/research for the traineeship The European Space Agency is seeking a Research Fellow to advance innovative resilience and security applications that leverage the combined strengths of Earth
-
, religious or ethnic background, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening
-
examine affective metrics such as perceived safety, comfort, and opportunities for social interaction. The outcomes are synthesized into integrated multidisciplinary solutions that combine data-driven
-
sensing, and field data, you will work on clarifying the links between water and food security in rainfed systems in Ethiopia and Kenya. Cost-benefit and return-to-labor analyses will inform farmer
-
basis and continue recruiting until the position is filled. In the event of equal suitability, preference will be given to the internal candidate. A knowledge security check can be part of the selection
-
, religious or ethnic background, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening
-
, including policies, infrastructure, technology, safety, economic incentives, and public acceptance. You will be involved in three specific subprojects: Analyzing the employment effects of the green transition
-
application to Prof. dr. M.T.J. Spaan. Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during