Required:• Proficient with Linux. Minimum of 3 years Linux system administration experience (within the last 3 years).• Knowledge of physical and virtual servers.• Experience researching and creating solutions to close IAVA's. • Ansible exp...
Python•Experience using MongoDB or MariaDB•Experience using Django or Flask•ReST endpoint •Micro services Desired:•Swagger•AWS, C2S or other cloud experience•Docker•Visual Studio Code or similar IDEs•JSON and/or XML serialization•Jira•Co...
Description: Analyze user requirements to derive software design and performance requirements Design and code new software or modify existing software to add new features Debug existing software and correct defects Integrate existing so...
Required: Five (5) years experience in applied machine learning in programs and contracts of similar scope, type, and complexity is required. A Master's or Ph.D. degree in advanced math, artificial intelligence, data science, computer scie...
This position requires in-scope poly, within 7 years. - Programming Languages: Proficiency in programming languages such as Python and R is crucial for data manipulation, analysis, and implementing algorithms. Python is favored for its si...
Description: Analyze and resolve complex problems associated with server hardware, applications, and software integration. Configure and manage Linux operating systems and install/load operating systems software, troubleshoot, maintain int...
Control, Accountability);and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory...
"Design and code new software or modify existing software to add new features Debug existing software and correct defects Integrate existing software into new or modified systems or operating environments Develop simple data queries for ...
This position requires in-scope poly, within 7 years. Sourcing for a candidate with strong Java experience as well as experience with MapReduce, Cloud experience, GhostMachine and QTA. Fourteen (14) years' experience as a SWE in program...
Control, Accountability);and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory...