3 of 3 Data Extraction Jobs in West Yorkshire

Data QA Engineer

Hiring Organisation
Fruition Group
Location
Leeds, West Yorkshire, Yorkshire, United Kingdom
Employment Type
Contract
Data QA Engineer, Data & Analytics Location: Leeds (Hybrid, 2 days onsite per week) Rate: Competitive day rate (Outside IR35) Fruition are recruiting for a well-known organisation undertaking a major data and analytics programme within Azure. The business has recently delivered a successful Proof of Concept … cloud-based analytics solution, enabling secure data extraction from a centralised Data Lake to external platforms. This contract role will focus on leading QA activity to productionise the solution into a live MVP, supporting a critical delivery phase within a highly technical Azure data environment. ...

Senior Software Engineer

Hiring Organisation
Addition
Location
Wakefield, West Yorkshire, UK
Employment Type
Full-time
Senior Software Engineer (Python - FastAPI) This fast-growing consultancy is pushing the boundaries of AI and data science, helping clients turn complex challenges into scalable, production-ready solutions. They're now hiring a Senior Software Engineer who can blend deep technical expertise with a practical, delivery-focused mindset. Role … Overview: Location: London (hybrid) Package: Competitive salary + bonus + benefits Industry: AI, Data Science & Technology Consulting Security Clearance: Applicants Must have Active SC Clearance or above What You'll Be Doing: Leading the end-to-end design and build of applications that utilise advanced AI and data ...

Vulnerability Researcher

Hiring Organisation
NSD
Location
Normanton, West Yorkshire, UK
Employment Type
Full-time
teams to design prototypes, test hypotheses, and document findings that directly influence future cyber capabilities. Key responsibilities include: Hardware teardown, characterisation, and reverse engineering Data extraction from flash memory technologies such as NAND, eMMC, and SPI Performing side channel attacks including timing, voltage glitching, and power analysis Developing … vulnerabilities Producing clear technical documentation for a range of stakeholders Vulnerability Researcher essential skills Experience with hardware development and prototyping Hands-on experience extracting data from flash memory Use of logic analysers, oscilloscopes, and advanced soldering techniques Understanding of side channel attack methods Programming experience in C, C++, Python ...