Sort by
Refine Your Search
-
briefly describes his / her experience in teaching, language and knowledge (e.g., study certificate). The application must also contain which courses the applicant is interested in and an estimate
-
, neoliberalism and fascism; histories of memory, future, temporality and scale. We welcome a plurality of geographical scopes and chronologies. The working language is English. https://www.idehist.uu.se/doctoral
-
experience in teaching, language and knowledge (e.g., study certificate). The application must also contain which courses the applicant is interested in and an estimate of the number of hours he/she wants
-
procedure The application must contain a letter in which the applicant briefly describes his / her experience in teaching, language and knowledge (e.g., study certificate). The application must also contain
-
multidisciplinary environments. Good computer skills and good spoken and written English language skills are necessary. For courses in Swedish (marked with *), good language skills in Swedish in speech and writing
-
spoken and written English language skills are necessary. For courses in Swedish (marked with * in the course list), good language skills in Swedish in speech and writing are necessary. Documented ability
-
programming skills in Python or similar high-level language Ability to quickly learn new skills Experience with Git Thorough understanding of information security High proficiency in a Unix/Linux environment
-
is a state agency with Swedish as the main language, administrative meetings and documents are often in Swedish and cannot always be translated. It is therefore desirable that an employee learns
-
their position must be able to teach in the other language as well within two years. As stipulated in the Appointment Regulations for Uppsala University, one general qualification required for teaching staff is
-
Cybersecurity, related to at least one of our current research areas listed above, and within at least one of the following topics: language-based security, privacy, computational models for information disorder