27 coding-"https:"-"FEMTO-ST"-"CSIC"-"P"-"UCL" "https:" "https:" "https:" "https:" "https:" positions at University of Michigan
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
Apply Now How to Apply Apply through http://careers.umich.edu/ (click on ?APPLY NOW? box on the upper right corner of this page). Applications will only be accepted from current undergraduate
-
processes are highly reliable, repeatable, and scalable Infrastructure as Code & Application Services Champion Infrastructure as Code (IaC), developing reusable modules and template Architect and deploy
-
discovery through user research, prototyping, and experimentation to validate solutions that are feasible, usable, and valuable Write production-quality code in Python/Django and JavaScript/React/Vue while
-
, actively participating in codes. Fluency in reading, writing and speaking English. Why Join Michigan Medicine? Michigan Medicine is one of the largest health care complexes in the world and has been the site
-
application components with HTTP APIs . Experience writing and documenting high-quality code using version control systems (e.g., Git, SVN, etc.). Experience with continuous integration tools (e.g., Jenkins
-
codes. Fluency in reading, writing and speaking English. Why Join Michigan Medicine? Michigan Medicine is one of the largest health care complexes in the world and has been the site of many groundbreaking
-
humans. Responsibilities include but are not limited to: overseeing data collection and coding of nonhuman primate behavioral research at several field sites, human subject recruitment and scheduling
-
. The MPOG team includes clinicians, quality improvement experts, software developers, statisticians, and administrators. For more information, please visit https://mpog.org/about/ Position Summary
-
Apply Now How to Apply Applicants are required to submit a (1) cover letter, (2) resume, and (3) example code via the UM Careers website as one combined electronic document. The cover letter should
-
disassembly, mobile device security, NAC, secure code review, secure remote access, secure wireless networking, penetration testing, PKI, policy development, risk management, SIEM, threat modeling, two-factor