54 coding-"https:"-"Prof"-"FEMTO-ST"-"https:"-"https:"-"https:"-"https:" positions at Carnegie Mellon University
Sort by
Refine Your Search
-
routines and system changes and suggest program and/or system changes. Document new designs, codes, and modifications. Manage software code repositories. Setup software to run in classrooms over the Internet
-
designs, codes, and modifications. Manage software code repositories. Setup software to run in classrooms over the Internet. Work in classrooms, monitoring how actual users (students) work with learning
-
existing software artifacts and leading customer engagements. The ideal candidate will have significant experience in full software lifecycle development, the ability analyze source code and mentor others
-
to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and complex
-
their tradecraft to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and
-
years of experience Experience with coding Requirements: Successful background check Joining the CMU team opens the door to an array of exceptional benefits. Benefits eligible employees enjoy a wide
-
years of experience Experience with coding Requirements: Successful background check Joining the CMU team opens the door to an array of exceptional benefits. Benefits eligible employees enjoy a wide
-
help is needed. Must understand the scope of the job assigned and connect with customers to ensure scope of work is understood. Proven understanding of the National Electrical Code and applicable City of
-
maintenance problems or concerns Following all required traffic laws as contained in Title 18, The PA Vehicle Code, and all Federal DOT regulations and requirements for CDL operators Maintaining constant direct
-
their tradecraft to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and