
Search by job, company or skills
Showing 10 jobs
Skills:
Java, C, Restful Apis, Microservices, Go, artificial intelligence tools, GRPC
Skills:
Software Development Life Cycle, Machine Learning, Agile Methodologies, Programming Languages, Artificial Intelligence, Cloud Technologies, database querying languages, modern front-end technologies
Skills:
.NET, software design patterns , data structures, Restful Apis, Azure Cloud technologies, test-driven development, DevOps practices, object-oriented programming, automated testing frameworks
Skills:
Hadoop, Etl Development, Scala, Data Modeling, Dataproc, Hive, Presto, Spark, Big Data Technologies, DataFlow, Azure, Python, AWS, Big Query, Airflow, Data lake architecture, Cloud Composer, GCS, GCP technologies
Skills:
Java, Cloud Services, Springboot, Hibernate, Microservices, Rest Services, React, Javascript, JDBC, AWS, messaging systems, Relational Databases, non-relational databases
Skills:
Java, JUnit, Mockito, Docker, Spring Security, Spring Boot, Kafka, Kubernetes, Spring Data, Pub Sub, Spring Test
Skills:
data engineering , Machine Learning, Artificial Intelligence, Deduplication, Big Data, Deep Learning, Data Integration, Elastic Computing, Storage Solutions, entity resolution, Batch Processing, Parallel Processing, Classification, AWS technologies, service-oriented architectures, data processing systems
Skills:
Algorithms, Testing, Debugging, Operating Systems, Programming Languages, Ui Development, software development frameworks, Troubleshooting, Scrum methodologies
Skills:
Servicenow, Javascript, Client Scripts, Ui Policies, Itsm, Soap, Devops, REST, Cmdb, Business Rules, Service Catalog, MID Server, Accounts Payable, Finance Management, IntegrationHub, CI CD, Service Portal, Accounts receivable, Flow Designer, discovery, ETL Integration Hub, Source-to-Pay, ATF, Workspace configuration, Order-to-Cash, UI Builder, MCO, Script Includes, DataFabric, Zero Copy Connectors
Skills:
threat modeling , Golang, API security, Linux, Kerberos, Network Security, Ssh, Python, Security Tool development, Vulnerability detections, Security Protocols
