Sort by
Refine Your Search
-
initiatives. Working closely with business stakeholders, their primary responsibility is to understand business needs, document, develop, tests and implement low-code solutions to automate business processes
-
judgment — not coding full-time. What You Will Do Shape the technical design and architecture of the Enterprise Intelligence Hub. Build Python scripts, services, and connectors (targeted coding, not full
-
), vulnerability detection, and LLM-powered code generation. With experience in developing multi-agent repair systems, integrating program analysis with LLMs, and exploring vulnerability detection frameworks
-
. The ideal candidate will act as a bridge between business needs and technology solutions, leveraging low-code or no-code platforms to develop solutions that enhance operational efficiency and advance SAO’s
-
, data cleaning, statistical and thematic analysis. Familiarity with statistical software (e.g., SPSS, R, or Mplus) and qualitative coding tools (e.g., NVivo). Strong writing skills and ability
-
administrative processes using emerging technologies such as Generative AI and low-code platforms As a key enabler and catalyst for change, the job holder will collaborate closely with internal and external
-
organizational priorities, and support the adoption of digital tools to enhance operational excellence. Technology Solutions Development & Support - Build, maintain, and administer low-code/no-code applications
-
empirical and quantitative skills. 3. Has good coding skills. 4. Has good communication skills. 5. Visualization skills an added advantage. We regret that only shortlisted candidates will be notified. Hiring
-
of Microsoft applications. Tech-savvy, with a basic knowledge and understanding in SQL and web markup language coding. Proficiency in Chinese is essential as the job holder is expected to review database records
-
of relevant research experiences or equivalent Prior experience in working with embedded systems is required. Prior experience with coding and evaluation of cryptography algorithms, specifically Post-Quantum