AvisTech Talent Pool
computer network architect
Computer network architects, or network engineers, design and deploy computer and information networks. After deployment, they also may manage the networks and troubleshoot any issues as they arise.
database administer
Database Administrators ensure that the databases run efficiently and securely. For example, they create or organize systems to store different data types, such as financial information and customer shipping records. They also make sure authorized users can access this information when needed.
computer and information research scientist
Computer and information research scientists typically do the following: Explore problems in computing and develop theories and models to address those problems. Collaborate with scientists and engineers to solve complex computing problems. Determine computing needs and system requirements.
Information security manager
Information security managers are responsible for ensuring that all security programs, tools, and technologies are working correctly, as well as providing the necessary protections to the company's networks, digital communications, and databases.
software developer
A Software Developer designs and builds computer programs that power mobile devices, desktop computers, and even cars. They not only identify user needs but also create new applications for any given market while making improvements based on feedback from users.
software development engineer
Software engineers focus on applying the principles of engineering to software development. Their role includes analyzing and modifying existing software as well as designing, constructing and testing end-user applications that meet user needs — all through software programming languages.
computer system analyst
Analysts create diagrams to help programmers and architects build computer systems. Computer systems analysts, sometimes called systems architects, study an organization's current computer systems and procedures and design improvements to them. In doing so, these analysts help the organization operate more efficiently.
database administrator
Database Administrators ensure that the databases run efficiently and securely. For example, they create or organize systems to store different data types, such as financial information and customer shipping records. They also make sure authorized users can access this information when needed.
cyber security manager
Cybersecurity managers monitor the channels through which information flows into and out of an organization's information network. They are responsible for observing all of the operations occurring across the network and managing the infrastructure that facilitates those operations.
security engineer
System Security Engineer responsibilities include:
Engineering, implementing and monitoring security measures for the protection of computer systems, networks and information. Identifying and defining system security requirements. Designing computer security architecture and developing detailed cyber security designs.
UNIX system administrator
Installs, configures, and maintains UNIX operating systems operating within a business. Analyzes and resolves problems associated with the operating system's servers, hardware, applications, and software. Detects, diagnoses, and reports UNIX related problems on servers
data scientist
A Data Scientist is a professional who collects large amounts of data using analytical, statistical, and programmable skills. It is their responsibility to use data to develop solutions tailored to meet the organisation's unique needs.
computer and information security manager
Information security managers are responsible for ensuring that all security programs, tools, and technologies are working correctly, as well as providing the necessary protections to the company's networks, digital communications, and databases.
mobile app developer
A mobile app developer uses programming languages and development skills to create, test, and develop applications on mobile devices. They work in popular operating system environments like iOS and Android and often take into account UI and UX principles when creating applications.
sr. computer systems analyst
Analysts create diagrams to help programmers and architects build computer systems. Computer systems analysts, sometimes called systems architects, study an organization's current computer systems and procedures and design improvements to them. In doing so, these analysts help the organization operate more efficiently.
MIS manager
The MIS manager establishes budgets for hardware and software and develops procedures, standards, and training for enterprise software and data management. The MIS manager is responsible for the planning and implementation of hardware and software applications at the enterprise and desktop level.
web developer
A Web Developer is in charge of ensuring websites look good and function properly. Web developers collaborate with website and graphic designers, monitor website traffic, troubleshoot website problems when they arise, and update websites as necessary.
network architect
Computer network architects, or network engineers, design and deploy computer and information networks. After deployment, they also may manage the networks and troubleshoot any issues as they arise.
DevOps engineer
A DevOps engineer is responsible for the smooth operation of a company's IT infrastructure. They work with developers to deploy and manage code changes, and with operations staff to ensure that systems are up and running smoothly
cyber security architect
A cybersecurity architect (sometimes just called a “security architect”) is responsible for designing, creating, and maintaining the security systems within an organization's IT network, including the computer systems and data.
machine learning engineer
Machine learning engineers develop self-running AI software to automate predictive models for recommended searches, virtual assistants, translation apps, chatbots, and driverless cars. They design machine learning systems, apply algorithms to generate accurate predictions, and resolve data set problems.
cyber security engineer
Cybersecurity engineers, sometimes called information security engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime.
cyber security analyst/consultant
What Is a Cybersecurity Consultant? A cybersecurity consultant is responsible for identifying problems, evaluating security issues, assessing risk, and implementing solutions to address threats to a company's computer networks and computer systems.
cyber security manager
Cybersecurity managers monitor the channels through which information flows into and out of an organization's information network. They are responsible for observing all of the operations occurring across the network and managing the infrastructure that facilitates those operations.