In this role, you will enabling innovation through continuous deployment in devops w/ technologies like chef and puppet, building web & mobile scale-out applications using memcached or redis, rdbms (mysql, aws aurora, oracle, sql server, and postgres) and/or nosql (aws dynamodb, mongodb, and cassandra) data stores. In-depth knowledge of cloudformations, json and python.
The IT Software Engineer position requires both strong technical skills and the ability to understand business requirements. You will analyze, design, modify, code, test, debug and install software applications utilized across the business to achieve targeted business goals and provide superior service to Teradata internal and/or external customers.
This role requires excellent operational knowledge of distributed environments in an always-up, always-available service set up. The ideal candidate should have a good blend of infrastructure technology and application development background.
In this position, you will develop java based and/or .net based web applications for use by internal and/or external company customers. design and build workflow solutions supporting Teradata business processes.
In this role, the selected candidate will gather and analyze business, content, and design requirements for desired web site modifications and enhancements; work with internal clients and team manager to plan and manage web and interactive projects.
In this role, the selected candidate will create conceptual architecture and develop solution options against the design; participate in all phases of projects from defining technical, operational and user requirements, to planning, quality control and testing.
In this role, you will be responsible to develops cost-effective information technology solutions by creating new and modifying existing software applications that are more complex with full competency.
In this role, the selected candidate will develop and execute security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.