and Training ( DHET) approved journals; Apply and secure research grants for national and international experience; Effective grantsmanship as evidenced by secured international competitive research grant(s); Experience Experience in the areas of global health security and/or climate change and health; Considerable international
and Training ( DHET) approved journals; Apply and secure research grants for national and international experience; Effective grantsmanship as evidenced by secured international competitive research grant(s); Experience Experience in the areas of global health security and/or climate change and health; Considerable international
research findings as conferences. Experience in securing external research funding and managing research research findings at conferences. Experience in securing external research funding and managing research Ability to write successful grant proposals to secure research funding from external sources. Ability
research findings as conferences. Experience in securing external research funding and managing research research findings at conferences. Experience in securing external research funding and managing research Ability to write successful grant proposals to secure research funding from external sources. Ability
Management System work instructions, and to ensure the security and confidentiality thereof. To market NOSA by
Management System work instructions, and to ensure the security and confidentiality thereof. Market further NOSA
Management System work instructions, and to ensure the security and confidentiality thereof. To market NOSA by
Management System work instructions, and to ensure the security and confidentiality thereof. Market further NOSA
and Informatics as well as the Centre for Cyber Security. The academy publishes research in peer-reviewed specialisation in one of the following fields: Cyber Security. Artificial Intelligence Having a proven track
and Informatics as well as the Centre for Cyber Security. The academy publishes research in peer-reviewed specialisation in one of the following fields: Cyber Security. Artificial Intelligence Having a proven track