Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
application to Dr. Swapna Ganapathy and Prof. Marnix Wagemaker. Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a
-
. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and
-
knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. The
-
online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things
-
other type of output. In addition to executing the projects, you will maintain the relationships with collaborators and manage the regulatory (IP rights, data safety etc.) and financial aspects
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are
-
income support—its timing, security, generosity, and scope—can help break intergenerational cycles of poverty and improve children’s developmental outcomes. As a post-doctoral researcher, you will become
-
to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things
-
background, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of