See all the jobs at Tech-Mex here:
| Full-time
, ,Tech-Mex, Inc., is an innovative US technology staffing company with an office in the Silicon Valley. Tech-Mex, Inc., is seeking qualified Tech Professionals.
Below is a list of the computer language skills we are currently looking for, and our overall eligibility requirements. If you possess one or more of these skills / qualifications and would like to learn more about career opportunities in the United States. Please apply, and a member of our recruiting team will contact you.
All positions come With fully paid health benefits. Other benefits vary by placement.
General Eligibility requirements:
US employment eligible or eligible TN visa
Inglés language proficiency
Willing to locate to US
Bachelor's degree in a technology field
3+ years of experience in one or more of the listed computer languages and skills
All CVs / Resumes Should be in Inglés
Below is a list of Areas of Expertise, you do not need to have all of these skills but the more you have the better:
Programming Languages:
.NET / C #
Java
JDBC
Jetty
JavaScript
Python
Objective C
Ruby on Rails
Unified Modeling Language (UML)
PeopleCode
Unix
HP-UX
Fortran
Scala
Erlang
Clojure
Kotlin
Skills:
Device Driver Specialist
Database
ETL
NoSQL
Mongo DB
SQL
MySQL
SQLlite
Cloud
Azure
Salesforce
Sharepoint
Nginx
Kanban
Cisco Routers
ERP, SAP, Oracle
Weblogic
JDBC
Omnigraffle
NetSuite
Dev Ops – AWS
80211.x Wifi
For those with Security Engineering backgrounds we are looking for:
-Design, implementation and administration of highly available and redundant infrastructure Linux
-Knowledge on o / s satellite mgmt, authentication (QMX), apache, tomcat. splunk agent deployment, report creation, splunk distributed deployment. puppet package deployment, automation - vm deployment
-Strong knowledge and experience in file systems (UFS, NFS, disk partitioning, file system tuning, car mounts, NIS, DNS)
-Strong knowledge and experience in OS Hardening, Performance Tuning, Kernel Customization,
Cryptographic protocols
Key management protocols
Data protection software
Data auditing
Web interface multi-location management
Threat modeling of complex security systems
Architecture specifications for complex security solutions
IPS/IDS best practices
Cisco, Palo Alto, or Juniper security
Proxy operation
Developing Layered Visio Diagrams