• Participates as a technical expert in designing, developing, coding, testing, documenting, and debugging software.
  • Implement significant enhancements, upgrades, and new features to existing software.
  • Collaborate with technical staff and end users to understand and troubleshoot software issues and implement appropriate solutions.
  • Follow appropriate software development guidelines including best practices in information security.
  • Deploy new versions of web applications and other developed software.
  • Maintains git source control repositories for May Institute software projects.
  • Assist in the development and maintenance of end user manuals, guides, and other technical documentation.


  • Bachelor s degree in computer science, management information systems, or related area preferred.
  • Full lifecycle application development experience in an enterprise environment.
  • Two or more years developing Visual Basic. NET and ASP. NET applications.
  • One or more years experience of Transact-SQL development experience.
  • One or more years experience Microsoft SQL Server 2014, Visual Studio, SQL Server Management Studio,. NET 4. 0 and later, HTML, CSS, jQuery, and JavaScript
  • One or more years experience of Source control using git
  • Familiarity with Microsoft stack technologies including Active Directory.
  • Familiarity with IIS Management
  • Familiarity with software development methodologies including Agile, Scrum, or RAD.
  • Windows PowerShell and batch scripting is a plus
  • SAP Crystal Reports experience is a plus.
  • Highly self-motivated and detail-oriented.
  • Ability to work both independently and in a team-oriented, collaborative environment.
  • Strong analytical and problem-solving skills.
  • Excellent documentation skills and the ability to multi-task in a fast paced environment.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Intern opportunities for undergraduate student...
Cambridge, MA Microsoft Corporation
Full-time opportunities for undergraduate stud...
Cambridge, MA Microsoft Corporation