Jobs

Fullstack Developer – Generative AI (Digital Consulting Associate) – Remote at Huron Consulting Group #vacancy #remote

Posted on:

The Opportunity Huron is a global consultancy that collaborates with clients to drive strategic growth, ignite innovation and navigate constant change. Through a combination of strategy, expertise and creativity, we help clients accelerate operational, digital and cultural transformation, enabling the change they need to own their future. Join our team […]

Jobs

Ruby – Backend Developer at Yieldbird Sp. z o.o. #vacancy #remote

Posted on:

Expected, Ruby, Ruby on Rails, PostgreSQL, Redis Optional, AWS, RSpec, Docker, Git, Github Actions Your responsibilities, How do we work?, , ●Our workflow: Agile/Scrum (two-weeks sprints), Jira (issue tracking), GitHub (code reviews), Slack (daily, grooming, planning), ●Tech Stack that we use within our Team:, Frontend: JavaScript, TypeScript, React, Backend: Ruby, […]

Jobs

IPC Developer at ITDS Polska Sp. z o.o. #vacancy #remote

Posted on:

Expected, Oracle, SQL, PL/SQL Optional, SQL Developer, SVN, GitHub, JIRA, Confluence Operating system, Windows, Linux About the project, As an Informatica Power Center Developer, you will be working for our client, a leader in the financial sector, focusing on the development and implementation of data warehouses and information systems. Your […]

Jobs

Motion Designer at Fun Crafters #vacancy #remote

Posted on:

Expected, Adobe Photoshop About the project, Embark on a journey with FunCrafters, where we’re not just a gaming company – we’re a hub for creative minds and innovators in the mobile gaming industry. With over a decade of experience, we’re dedicated to crafting immersive mobile games that captivate players. As […]

Jobs

Remote IAM / PAM Consultant @ Winged IT at Winged IT #vacancy #remote

Posted on:

5+ years of experience in a similar role; Ability to run multiple queries across different systems (Python, AWS API, Active Directory, MS Graph API) to validate adherence to IAM/PAM best practices; In-depth knowledge of information security principles, including cryptography, authorization, and authentication; Experience conducting audits, including access audits, permissions reviews, […]