53 coding-"https:"-"FEMTO-ST"-"L2CM"-"UCL"-"Inserm"-"PhD-Jobs" positions at Northeastern University
Sort by
Refine Your Search
-
Computing Center (MGHPCC). You will help with optimization of code and utilization of scheduler features to maximize throughput of jobs. In addition, you will work with research groups to help identify
-
at the Massachusetts Green High Performance Computing Center (MGHPCC). You will help with optimization of code and utilization of scheduler features to maximize throughput of jobs. In addition, you will work with
-
genomics data, writing Python code for data analysis, and a downstream R pipeline for post-processing data using standard Bioinformatics libraries from Bioconductor. There will be opportunities
-
include building an ETL pipeline for ENCODE genomics data, writing Python code for data analysis, and a downstream R pipeline for post-processing data using standard Bioinformatics libraries from
-
transformative AI projects. MINIMUM QUALFICIATIONS Expert knowledge of at least one major cloud platform (AWS, GCP, or Azure) Strong programming skills in Python and infrastructure-as-code tools Proficient with
-
in software engineering best practices, including version control, unit testing, source code management, documentation, and CI/CD workflows. Candidates with prior experience in graphical user interface
-
. Code Upgrades: Plan and execute network device code upgrades to maintain security and performance. Post Incident Reviews (PIR): Conduct post-incident reviews to identify root causes and implement
-
limited sample proteomics is highly desirable. Knowledge of R or Python coding would be desirable but not necessary. Applicants must include the following with their application: 1. Resume/CV 2. Cover
-
, data vault, star/snowflake schema, and data products. Required Skills: Ability to write clean, optimized SQL and pipeline code. Strong analytical and troubleshooting skills with ability to diagnose
-
infrastructure-as-code security SIEM solutions (e.g., Splunk) and vulnerability assessment tools Penetration testing and ethical hacking techniques Digital forensics and incident response practices Governance