Bristol Area, South West, United Kingdom Hybrid / WFH Options
Certain Advantage
to work from high level/system view into technical detail. Excellent verbal, presentation and written communication skills Knowledge of using Microsoft Windows and Linux operating systems Non-essential: Distributed simulation standards/Protocols (DIS, HLA, DDS) and web services development (JavaScript, Node JS or similar) Military Communications, Datalinks and more »
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Positive Employment
experience of developing applications in a business environment, ideally local or central government or a housing association. Experience developing in Oracle - PLSQL/SQL, Linux/UNIX etc. including some API development exposure. Designing and developing database schemas, stored procedures, functions, and triggers using PL/SQL. Optimizing database performance more »
BH1, Bournemouth, Dorset, United Kingdom Hybrid / WFH Options
Avanti Recruitment
on products, applications and high-speed PCIe devices. For this role you'll need: 5+ Years of C/C++ development 5+ Years of Linux Experience Proven Experience of software design and principles Write and Design with Languages UML, SDL Etc.. Frameworks like DPDK Engineering or Computer Science degree SC more »
United Kingdom, Exeter, Devon, United Kingdom Hybrid / WFH Options
4M Recruitment
environments (e.g. docker containers, conda environments) to support these platforms and hackathons. Develop trial implementations on cloud platforms, primarily AWS and Azure, and private linux compute clusters. Support testing of platforms by supporting trial projects and events Put relevant and appropriate security measures in place to protect data and other … candidates will ideally have experience in some of the following: Infrastructure development using Infrastructure as Code (IaC) processes AWS and Azure cloud awareness Docker Linux System integration Design – Turn business problem into technical design Security – understand information security and the security controls that can be used to mitigate security threats more »