choreography). Proven experience building RESTful and SOAP APIs, including API security and governance. Proficiency in DataWeave transformations and Mule 4 development. Knowledge of common integration protocols (HTTP, JMS, FTP/SFTP, JDBC) and cloud connectors. Familiarity with CI/CD pipelines (e.g., Jenkins, Azure DevOps) and version control (Git). Experience with CloudHub deployments and monitoring tools. Solid understanding More ❯
and performance standards. Communicate technical issues clearly and concisely to enable rapid problem-solving. What you'll bring: Strong understanding of HTTP, SOAP, REST, GraphQL, flat file formats (for FTP based flows etc) . Experience with Postman , browser developer tools, and version control (Git). Solid skills in JavaScript/TypeScript , with a keen attention to detail. Proven project-based More ❯
Experimenting with AI and automation to simplify and improve workflows Prompt Engineering The tech you’ll be around: JavaScript/TypeScript | APIs (REST, SOAP, GraphQL) | HTTP | Flat files/FTP | Go (nice to have) | Kubernetes (nice to have) | Cloud (AWS, Azure, GCP) | AI tools like ChatGPT, Claude, LLMs | Git What they’re looking for: They’re not after someone with More ❯
patterns and event-driven architectures. Awareness of CI/CD practices and deployment automation principles. Desirable Skills Exposure to Kubernetes (K8s) for container orchestration. Experience working with Secure FileTransferProtocol (SFTP) for secure data exchange. Additional Information To be considered for this role, you must hold active SC Clearance or be eligible to obtain SC Clearance . Reasonable Adjustments More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid/Remote Options
Twilo Creative
bottlenecks and areas for improvement using tools like WHM/cPanel or similar server management software. Optimise database queries and server configurations to reduce latency and improve scalability. Use FTP and other tools to manage file transfers and deployments efficiently. · Security & Compliance Implement security best practices to protect sensitive data and prevent vulnerabilities (e.g., SQL injection, XSS) in all back More ❯