Hiring Incentives

Our students

You are seeing all the students who have taken or are taking the Professional Master in BIM and Efficient Energy Management.

Amanda Casado Maciá

Amanda Casado Maciá

Master of Human Resources HR: People Management, Talent Development and Labor Management

Avatar Silhouette Flaw

Giovanni Morchio Peña

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Ana Alejandra Quero 1

Ana Alejandra Quero Bel

Master of Human Resources HR: People Management, Talent Development and Labor Management

Avatar Silhouette Flaw

Rosa Ana Rueda Carretero

Master of Human Resources HR: People Management, Talent Development and Labor Management

Maria del Carmen

María del Carmen Enguita Cano

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Esther Llanos

Esther Llanos Pizarro

Master of Human Resources HR: People Management, Talent Development and Labor Management

Avatar Silhouette Flaw

David Moreno Lopez

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

1637931837218

José Luis Liebana

Professional Master in Data Protection Audit, Risk Management and Cyber Compliance

Monica Hernandez

Monica Hernandez Morales

Master of Human Resources HR: People Management, Talent Development and Labor Management

Ana Daniela Sosa

Ana Daniela Sosa Pérez

Master of Human Resources HR: People Management, Talent Development and Labor Management

Isabel Arance

Isabel Arance Gallego

Master of Human Resources HR: People Management, Talent Development and Labor Management

Avatar Silhouette Flaw

Luis Caceres Faundez

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Crisitina Tascón González

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Cristina Álcaraz Cañada 1

Cristina Álcaraz Cañada

Master of Human Resources HR: People Management, Talent Development and Labor Management

Avatar Silhouette Flaw

Lucas Blanco Rasero

Master in Cybersecurity Management, Ethical Hacking and Offensive Security