first but theres a brilliant city-centre Edinburgh office, great for getting together with the team, especially in the early weeks. What were looking for: Strong experience with AWS (Azure or GCP a bonus) and one or more modern languages such as Java, JavaScript or Python Hands-on knowledge of Terraform or CloudFormation Familiarity with Kubernetes , serverless architectures, CI More ❯
Experience in biotech, pharma, or research environments. Familiarity with AI/ML infrastructure and bioinformatics workflows. Knowledge of WEKA storage, VMware vSphere, containerisation (Docker, Kubernetes), and cloud platforms (AWS, Azure). ITIL or security certifications (CISSP, CISM, etc.). Experience with GxP compliance and regulated environments. What We Offer Competitive salary and benefits package including bonus, life cover, critical More ❯
you will l lead the development of advanced analytics and machine learning solutions that drive real business value. What Youll Do Design, develop, and deploy machine learning models using Azure ML Studio and Python Translate complex data into actionable insights through Power BI dashboards and compelling storytelling Collaborate across teams to deliver secure, scalable, and responsible AI/ML … etc). (LEAD) Understanding of data science concepts, AI/ML models, evaluation approaches, and data science applications to enhance business processes. (LEAD) Proven hands-on experience in MicrosoftAzure ML Studio. (LEAD) Experience using business intelligence tools, preferably Power BI. Experience applying Generative AI and prompting techniques. Strong understanding of data governance, model observability, and compliance frameworks. Proven … ability to deliver secure, scalable, and responsible data science solutions. Excellent communication and presentation skills. Extensive experience working collaboratively with diverse colleagues and stakeholders. Nice to Have Microsoft Certified: Azure Data Scientist Associate Familiarity with the Microsoft ecosystem (M365, Power Platform, Azure) Awareness of cybersecurity principles More ❯