[Close] 

Java Developer

Company Name:
Youngsoft
job
Title: Technology Consultant - Java Developer
Location: Detroit, MI
Duration: 10 Months

Individuals within the Technology Consultant job family maintain the broadest range and depth of knowledge in their respective area of expertise within the IT organization. This job family is comprised of a specialized team of internal high-level subject matter experts who keep abreast of emerging technologies and influence strategic decisions regarding technical direction of the business.
Technology Consultants contribute to solutions that may span the full spectrum of IT hardware and software. They may create prototypes and lead initial development or enhancement efforts. They provide recommendations regarding technology, vendors, outside consultants, and trading partners. Each individual concentrates on one or more areas of technical expertise. These areas usually focus on systems that significantly impact the effectiveness of the organization(s) existing technologies. As technical advisors to internal or external clients, these individuals understand current systems and how IT strategies support client business strategies. They often reduce the need for external technical consulting expertise. Additionally, Technology Consultants provide assistance with escalated issues, mentor others within technology-related areas, and provide subject matter expertise on various project teams.
Technology Consultants are considered resources for the organization at large, and their responsibilities often go across organizational lines. As such, it is critical that they approach issues with both technical and business expertise. They frequently must influence people over whom they have no direct control, as they help define strategic technical and business plans.
Work Complexity:
Consults on multiple projects/programs as a subject matter expert of existing technology
Consults on and helps drive new technology direction
Consults on cross-divisional technology solutions
Consults on highly complex tasks, projects/programs or support issues that involve a high degree of risk/impact to the business unit performance and makes use of the individual's high level of knowledge within one or more areas of specialty
Typically does not provide administrative or management type support
Top Three Skills/Experience:
1. Java programming expertise using RAD and or other IDE tools
2. High level understanding of the Design/Architecture/Database
3. Working on multiple projects and able to guide the solution to other members of the team
Required Skills/Experience:
Java programming expertise including understanding of databases and Sequel statements writing
Come up with Designs
Deep understanding of SDLC including able to solve technical problems
Good understanding of the databases and working with multiple teams
Thorough understanding of Common
services
consumption and XML
Good understanding of Security principles for web development, including LDAP and other role based authentication
Working on multiple projects in parallel and able to guide the solution to other members of the team
Working with the testers to explain the various scenarios
Preferred Skills/Experience:
Experience in Health care industry
Work with architecture team to get approvals
Working with the business team to explain the solution
Educational Requirements:
Bachelor's degree in
computer
science, information systems, computer engineering, systems analysis, or related field required. Master's degree in computer science, information systems, computer engineering, systems analysis, or related field preferred.

Best Regards,
Ankur Srivastava
Technical Recruiter
Youngsoft Inc./H2H Solutions Inc.
SEI certified CMMI Level 3 company
49197 Wixom Tech Drive, Suite B
Wixom, MI 48393-3559
Phone: 248-675-1200 Ext.406
Find me on LinkedIn:http://www.linkedin.com/pub/ankur-srivastava/11/1a9/50b

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.