This role focuse on providing high quality, cost-effective IT solutions to business partners by creating new software applications or modifying and/or supporting existing packaged or custom-built applications.
In this role, you will manage our work, our relationships and ourselves. As an employee of the firm, you will live true to our core values of people first, being exceptional every day in every way, embracing change, feeling empowered through knowledge and choosing accountability.
In this role, you will live true to our core values of people first, being exceptional every day in every way, embracing change, feeling empowered through knowledge and choosing accountability. Our core values are the standards by which we conduct ourselves day in and day out, both internally and externally.
In this role, the selected candidate will be part of the Infrastructure Protection Unit within the Information Technology Group; analyze packet captures, network configs, system logs, application code and scripts.
The QA Engieer will develop, publish and implement test plans for complex, multi-tier, applications throughout the full lifecycle of the software. Write and maintain test automation, publish test results and provide feedback to the SDLC to enhance quality. The QA Engineer will be responsible for about 50% manual testing and 50% creating automation testing tools. This is a Direct Hire opportinity so we are unable to do Corp to Corp.
This role will be on the AWD Application team, with responsibility of playing overall technical lead on the application with exposure to all aspects of the application including all build and run activities.
In this role, you will analyzes and validates the most complex system requirements and existing business processes and information systems to ensure desirability, practicality, and resource availability and capability.
The IT Security Engineer is responsible for a broad range of tasks, including plan, design, deploy, integrate and maintain IT security systems into Signet computing environments including systems used for logging, monitoring, intrusion detection, centralized cyber security knowledge base, and behavioral analysis.