- IBM (Denver, NY)
- …from project preparation to go-live as a Management Consultant or Solution Architect . . SAP Expert Level Process Knowledge: Experience with customer service business ... models, their use in SAP implementation and knowledge of cybersecurity and data privacy principles . Language Proficiency: Fluency in English. . Eligibility and… more
- Deloitte (New York, NY)
- …CPA eligible: + Licensed Attorney + Enrolled Agent + Technology Certifications: + AWS Certified Solutions Architect + CBAP(R) - Certified Business Analysis ... at multiple levels. + Exposure to emerging technologies such as cloud, data analytics, or cybersecurity. At Deloitte, Senior Project Managers are instrumental in… more
- JPMorgan Chase (New York, NY)
- …managing projects end-to-end, from requirements scoping to successful launch. + Completed AWS Developer or Solution Architect Certification + In-depth knowledge ... web technologies + Hands-on experience designing and building enterprise-scale, high-volume data processing applications using SQL and NoSQL databases. + Knowledge… more
- Finn Partners (New York, NY)
- The AI Solutions Engineer is the primary builder, architect , and technical steward of the organization's internal AI capabilities. This role is responsible for the ... for generative models (Gemini, ChatGPT, Claude, etc.). . Assist teams with data preparation, fine‑tuning and evaluation to maximise solution accuracy, safety and… more
- New York Times (New York, NY)
- …of video initiatives from technical design through production operation. + Architect and build frontend solutions that are performant, reliable, and scalable ... Develop technical strategies for video that scale across use cases, using data to inform architectural decisions. + Improve video playback performance and… more
- Axis (New York, NY)
- …all cloud environments using security benchmarks and policy-as-code. + Engineer, Architect and enforce robust identity and access management (IAM) models, including ... least privilege principles. + Apply layered security controls across identity, network, data , and application layers to reduce attack surface and improve detection… more