Job offers
Embedded Linux Consultant
...the plumbing of the OS inside and out, who is proficient with distribution packaging, software design , system debugging...
Usability Engineer
...are hiring a Usability Engineer for our Design Team. User Science is an evolving design discipline at Canonical. While...
Engineering Manager
...to improve our infra-as-code products based on our own real experience, mirroring that of our users and customers. We...
Machine Learning Engineer
...learning solutions for enterprise and government clients. This role is critical in designing , building, and deploying...
Software Engineer
...with CRO to lead discovery calls, requirements gathering, and client workshops Design high level AI/ML...
Associate
...solutions. Responsibilities Assist in the design , development, testing, and deployment of software...
Associate
...Responsibilities Assist in the design , development, testing, and deployment of software applications...
Software Engineer
...will be responsible for designing , developing, and implementing software systems and back-end web services. Day-to-day tasks include...
Associate
...solutions. Responsibilities Assist in the design , development, testing, and deployment of software...
CRM Developer
The CRM Developer will design , customize, and enhance TSAVO's CRM platform to support sales, marketing, customer...
Senior Software Engineer
...and operated by end- users on their own multi-cloud or on-premise environments. Canonical is looking for an experienced...
Back End Developer
...with the organization's goals and objectives. Project Overview: The Developers will be responsible for designing...
Software Engineer
...2019, Turaco has attracted a cumulative total of 4 million end users . We are experiencing rapid growth and are looking...
Security Software Engineer
...security through state-of-the-art practices such as threat modeling, table-top exercises, architecture and design reviews...
Microsoft Azure DevOps Professional
...use cases. Secure code repositories against internal threats and implement best security practices. Design...