To help you find the most relevant
jobs, we've come up with an approximate compensation for this
position. This is based on similar jobs with compensation
$100K to $140K -New York, NY
In this role, the selected candidate will assist in evaluating technical architecture of vendor solutions and adapting them to fit; design and implement system infrastructure components as well as non-functional system solutions and processes.
In this role, the selected candidate provides application software development services or technical support typically in a defined project; develops program logic for new applications or analyzes and modifies logic in existing applications.
In this role, the selected candidate will build solutions that adhere to the development standards and architecture of the development team; works with business analysts to verify and clarify requirements before implementation.
his position primarily consists of cross-platform Mac OSX/Windows desktop application programming in RealBasic/Xojo; some components are also written in C/C++ and are built using XCode for the Macintosh and, to a lesser extent, Visual Studio for Windows.
In this role, the selected candidate will analyze, design and develop next generation User Interfaces for desktop, web and mobile; architect and develop communication platform for call processing, recording and management software.
In this role, the selected candidate will design, develop and test real-time software for low-latency algorithmic trading, risk management and trade reporting. Provide 2nd/3rd level application support as required.
In this role, the selected candidate will write, maintain, and analyze the performance of ad-hoc SQL queries, stored procedures, and C# code that interfaces with MS SQL databases containing millions of rows.
In this role, the selected candidate will be responsible for the design, development, testing, deployment and support of complex IT security solutions, tools and services and centralized Encryption and Authentication security systems to ensure protection of proprietary/confidential data and systems and adherence to IT security policies and procedures.