Få nye jobs på e-mail
- ...Do you have experience with GxP compliance and IT systems and want to broaden your expertise Join us as IT Compliance Specialist where... ...Manager Anne Ruby Baltsersen and become a vital part of Cyber Security & Compliance in Corporate IT. Who are you You hold a...
- ...interesse for KQL og Microsoft Graph API Gerne 2-5 års erfaring fra IT-konsulentbranchen med fokus på Microsoft365 og sikkerhed.... ...politikker, Multi-Factor Authentication (MFA), Zero Trust-arkitektur og Security Score. Kendskab til complianceværktøjer som Microsoft Purview...
- ...IT Projektmedarbejder - Nyt OUH Om stillingen Klinisk IT søger en projektmedarbejder, der ønsker at bidrage til den samlede IT-understøttelse af det nye OUH. Stillingen indgår i arbejdet med at realisere visionen om, at Nyt OUH skal have Danmarks mest sammenhængende...
- ...Forskerstøtteenheden OPEN arbejder på at fremme sundhedsvidenskabelig forskning i Region Syddanmark. Afdelingen består af tre funktionsområder, IT & projektkoordinering, Data & Metode og GCP. I It & Projektkoordinering er en række mindre teams forankret, herunder IT-teamet med 8...
- ...Solutions We are looking for a senior executive responsible for shaping and executing the strategic direction of the organizations IT & technology software development and business engagement landscape. This role bridges the gap between business objectives and...
- ...Are you passionate about driving strategic IT initiatives and maximizing business value We are looking for an experienced IT Project Portfolio Manager to oversee our IT Project portfolio and lead our demand intake process. Join us to make a real impact on our business...
- ...looking for a strategic and results-driven leader to guide Orifarms IT transformation journey. As IT Transformation Lead you will... ...across central shared services such as infrastructure data OT and security as well as business-facing delivery teams. You will align IT...
- ...We are looking for a strategic IT Business Partner who can bridge IT and business driving alignment between technology initiatives and operational goals. You are analytical proactive and skilled at navigating complex organizational structures. About the job As...
- ...af avancerede logistiksystemer på det nye universitetshospital i Odense (OUH), og sikre en stærk forankring ind i Region Syddanmarks it-organisation, så er det dig vi søger. ”Driften af det nye OUH er baseret på den nyeste teknologi inden for bl.a logistikområdet, og...
- ...faktisk kan forklare forskellen på iCloud Drive og Google Drive uden at nogen falder i søvn Hos Jeppesen ForeFlight leder vi efter en IT System Administrator der både har styr på detaljerne og evner at se det store billede. Du trives i en verden af struktur og...
- ...attention to (Critical) Intelligence and Security Studies. Starting date is planned for February... ...125 people and attracts 2500 students in its various full-time bachelor and master... ...weight in the assessment of any candidate. It is additionally important to us that...
- ...We are looking for a visionaryChief Information Security Officer (CISO)to lead cybersecurity strategy execution and this role you will be... ...information systems while fostering a culture of cybersecurity and IT compliance awareness and resilience both within Corporate IT and...
- ...direction for Orifarms application landscape ensuring a coherent secure and scalable system architecture across processes and data Designing... ...initiatives collaborating closely with business stakeholders and IT delivery teams Enabling delegated execution by establishing...
- ...implement sales strategies for your assigned markets prospect and secure new customers and partners and support distributors with training... ...days per year Confident user of CRM/ERP systems and general IT tools Permission to work in Denmark Personal characteristics...
- ...gene regulation underlying cell identity and its disruption in human this project the... ...deep learning. Depending on the interest it is also possible to be involved in the wet... ....g. health coverage parental leave social security etc.) Support with practical social and...
- ...system for surgeons and other users and gather feedback on how it fits into real surgical workflows. Work with an external company... ...risk of unwanted knowledge transfer are subject to a number of security measures. Therefore based on information from open sources...
- ...educational activities. You will collaborate with academic staff to secure external funding join research projects and teams and deliver... ...of the most relevant research articles if you submit a monograph it counts as 3 articles. Please upload a pdf for each publication. For...
- ...life at the department as well as participate in the guidance of junior faculty. It is an expectation that the candidate can document skills in academic leadership an ability to secure external research funding and/or a track record in establishing strong ties with...
- ...philosophy (health politics climate change education technology). It has attracted substantial external funding and is deeply engaged... ...risk of unwanted knowledge transfer are subject to a number of security measures. Therefore based on information from open sources...
- ...is not only a fundamental condition but also our strength. And it is a strength that ensures our research and education are recognized... ...risk of unwanted knowledge transfer are subject to a number of security measures. Therefore based on information from open sources...
- ...liquids. The robotic solution should be flexible in the sense that it should be able to conduct several experiments with little user-... ...scientific conferences/journals. Supporting the team in securing external funding. Contributing to the project CAPeX deliverables...
- ...software engineering (software product lines) human factors in security and privacy post-quantum and embedded cryptography and quantum programming... ...the most relevant research articles if you submit a monograph it counts as 3 articles. Please upload a pdf for each publication....
- ...leading journals of your discipline. Securing research and innovation funding from Denmark... ...with the seniority level of the position it is expected: Demonstrated academic... ...reviewed publications Proven ability to secure research funding and effectively manage interdisciplinary...
- ...for you if you want to live in a tropical and beautiful nature. It is important that you can see yourself long term in Thailand. *You... ...hours ~ Hybrid work model ~ Health insurance and social security ~ Visa and work permit provided, with full guidance ~25 paid...
- ...automation and innovation. You will lead our Operational Technology (OT) and Manufacturing IT team ensuring strong collaboration between business and IT to deliver smart secure and scalable manufacturing systems. Your key responsibilities will include: Developing...
Assistant Professor (tenure-track) and Associate Professor (tenured) Positions in Computer Scienc...
...software engineering (software product lines), human factors in security and privacy, post-quantum and embedded cryptography, and quantum... ...more than 27.000 students, almost 20% of whom are from abroad. It has 3,800+ employees, and 115 different study programs in the fields...- ...within the Faculty of Engineering known for its contributions to software engineering... ...data analytics and intelligent systems and it plays a key role in several ongoing European... ...knowledge transfer are subject to a number of security measures. Therefore based on information...
- ...Odense Developer - Join our cloud-driven team! About the role Were looking for a Developer to help us build scalable secure and innovative solutions in a modern cloud environment. Youll play a key role in designing and optimizing our Azure-based architecture...
- ...building up a sales force / marketing machine ~ Funding support for securing a multi-million euro funding round within 12 months (on average... ...to take full responsibility for your own startup and scale it to 100M in revenues You have excellent communication skills...
- ...software engineering (software product lines) human factors in security and privacy post-quantum and embedded cryptography and quantum programming... ...more than 27.000 students almost 20% of whom are from abroad. It has 3800 employees and 115 different study programs in the...