
Begin your journey Datametrics Software Systems at a place where you can give your ideas a stage, create waves of change and empower the next-generation technologies. The time is now, the revolution is here! Datametrics Software Systems is offering employment in multiple positions.
Systems Engineer is needed to perform the following duties:
Working on deployment, maintenance and scaling of applications using Kubernetes and Infrastructure as code (Iac) tool Terraform to safely and predictably create, change and improve infrastructure. Worked on implementation and integration of DORA metrics for our application to better understand and improve DevOps efficiency and communicate performance to business stakeholders, which can accelerate business results. The DORA metrics dashboard helped in providing end-to-end visibility to the entire software delivery lifecycle which enabled teams and managers to understand all aspects of productivity, quality, and delivery. Integrate SonarQube for automated code quality analysis and JFrog for streamlined automated artifact deployments. Writing groovy scripts and creating multibranch pipelines on Jenkins for our application by continuously integrating with Bitbucket, SonarQube and Nexus. Help on cleaning repositories that have been obsolete on Bitbucket and also deleting their related projects on Jenkins. Work on setting up SCA and SAST scans for my project and submitted the reports to Veracode platform to scan for the vulnerabilities in the software libraries that are currently being used by our project. Involve with the team to help and fix the projects in Jenkins that are not configured for using SSH to improve security. Working on troubleshooting and fixing the build failures/issues in real time to facilitate the team to ensure smooth development and prompt deployments. Bachelor's Degree is required in Computer Science or Computer Engineering or Information Systems or Information Technology Management. Bachelor's Degree is required in Computer Science or Computer Engineering or Information Systems or Information Technology Management.
Systems Analyst
Systems Analyst is needed to perform the following duties: • Execute ADA accessibility audits using Axe, WAVE, Lighthouse. • Use screen readers (JAWS, NVDA, TalkBack) for usability validation. • Ensure compliance with Michigan digital standards across browsers/devices. • Document accessibility issues with evidence and remediation suggestions. • Collaborate with dev/UX teams to apply accessibility best practices. • Attend client meetings to discuss compliance reports and fixes. • Test using assistive technologies across platforms and environments. • Log results and contribute to improving accessibility testing workflows. • Maintain compliance with legal mandates (ADA, Section 508, WCAG). Bachelor's Degree is required in Computer Science or Computer Information Systems or Computer Engineering or Computer and Information Science
.
Full Stack Developer
Full Stack Developer is needed to perform the following duties:&Develop and maintain responsive web applications using Angular (11-17) for vulnerability tracking and remediation. Lead the migration of applications to newer versions of Angular, enhancing performance and functionality. Collaborate with backend teams using Node.js, Express.js, and LoopBack 4 to ensure seamless API integration. Implement secure user authentication using Microsoft Authentication Library (MSAL) and integrate with Azure Active Directory (AAD). Ensure front-end application security by adhering to industry best practices and conducting comprehensive testing. Design and implement solutions that enhance operational efficiency and security across large-scale infrastructure. Manage and visualize large datasets with MongoDB, CosmosDB, and Snowflake, creating dynamic reports using Power BI. Integrate with Azure cloud services to ensure scalable, secure infrastructure and optimize database management. Utilize Azure DevOps for automating CI/CD pipelines, improving development efficiency. Work within an Agile framework, collaborating with cross-functional teams, including security experts, data scientists, and backend developers. Bachelor's Degree is required in Computer Science or Computer Engineering or Computer Information Systems or education + experience which is equivalent to a Bachelor’s Degree in Computer Science or Computer Engineering or Computer Information Systems.
.
Business Analyst
Business Analyst is needed to perform the following duties: : Requirement gathering and adhering to Industry Best standards/ Practices: 40%. Keep abreast with Agile/Scrum best practices and new trends. Capture requirement from clients and document Business requirement documents, Functional requirement documents. Translate Business requirements into meaningful Epics and Stories so that the scrum team can incrementally deliver their tasks. Assists the development team with the translation of business requirements into functional or non-functional specifications. Document and support development team with different artifacts like, user stories, wireframes, supporting documents and data mapping solutions and proper grooming of stories. Designing Business solutions: 20 % Design workflow diagrams, business logical diagrams, and wireframes using software tools to effectively communicate business ideas to clients. Partner with UX to ensure capturing UX requirements and come up with system and design documentation using software technology and tools like Draw IO, Visio, Figma. Product enhancements and propose business solutions: 15%. Possesses product knowledge and process improvement skills with a demonstrated ability to effectively propose solutions. Works with cross-functional teams to ensure that the business, quality, and functional goals are met with each product release. Communicates with team members, stakeholders, and all levels of management. Implement governance policies to ensure data security and compliance with industry regulations is not breached. Quality Assurance Responsibilities: 15%. Involve in test planning, creating test scenarios, reviewing test cases, and facilitating UAT, SIT and other testing activities in QA. Involve in testing backend APIs developed by backend team using software tools like Swagger and POSTMAN. Making sure quality of product has been tested thoroughly in different phases of SDLC [Dev, Test, Pre-prod, and Production] environment like Unit testing, smoke testing, regression testing. Works closely with the Test Manager to review end-to-end test scenarios, ensuring sufficient test coverage is achieved across the solution and work closely with Dev team in fixing those reported issues. Support and implementing the developed product: 10%. Knowledge on updated Tools and Technologies wherever necessary and participate in executive meetings to take decisions on change management and Release management. Leading root cause analysis of production issues and identifying resolution and preventative steps. Collaborates with the multiple technical teams daily, clarifying details and answering questions. Bachelor's Degree is required in Computer Science or Computer Information Systems or Computer Engineering.
.
Cyber Security Analyst
Cyber Security Analyst is needed to perform the following duties: • Create and enforce security policies, procedures, and protocols to ensure the protection of sensitive data and compliance with industry standards. • Develop and implement comprehensive security policies, procedures, and protocols to protect sensitive data and ensure compliance with industry standards such as ISO 27001, NIST, CIS Benchmarks, SOC 2, GDPR, and PCI-DSS • Continuously monitor security alerts and incidents, analyze threat intelligence, and respond promptly to mitigate risks. • I proactively monitor security alerts, analyze threat intelligence, and respond swiftly to mitigate risks. Using SIEM and SOAR tools like Splunk, Sentinel, and Elastic Security, I detect and investigate threats in real time. By integrating threat intelligence frameworks (MITRE ATT&CK, STIX/TAXII), I identify attack patterns and proactively enhance security defenses. • During incidents, I follow NIST and SANS methodologies to assess, contain, and remediate threats using Prisma Cloud, Wiz, and ServiceNow. Automated response mechanisms enable rapid containment of malware, unauthorized access, and cloud misconfigurations. I also conduct post-incident reviews to refine detection capabilities, strengthen security policies, and enhance overall threat resilience • Leverage automation tools to streamline security operations, including threat detection, incident response, and vulnerability management • I utilize automation tools to enhance security operations, including threat detection, incident response, and vulnerability management. By implementing SIEM and SOAR solutions like Splunk, Sentinel, and Cortex XSOAR, I automate log analysis, anomaly detection, and security event correlation, reducing response time and improving efficiency. • For incident response, I deploy automated playbooks to contain threats, quarantine compromised assets, and trigger remediation workflows in Prisma Cloud, Wiz, and ServiceNow. Additionally, I integrate vulnerability scanning tools(e.g., Tenable, Qualys) to identify and remediate security gaps proactively, ensuring compliance and minimizing attack surfaces. • Provide guidance and training to internal teams on security protocols, tools, and best practices to enhance overall security posture. • I provide guidance and training to internal teams on security protocols, tools, and best practices to strengthen the organization's security posture. This includes conducting workshops, knowledge-sharing sessions, and hands-on training on security tools like Wiz, Prisma Cloud, and ServiceNow. • I develop best practice guidelines for secure cloud configurations, threat mitigation, and incident response, ensuring teams adhere to industry standards. Additionally, I collaborate with stakeholders to improve security awareness, policy adherence, and proactive risk management across the organization. • Analyze potential risks to the network and cloud infrastructure and develop strategies to minimize their impact. • I assess network and cloud infrastructure risks, identifying vulnerabilities and potential attack vectors. Using risk assessment frameworks and tools like Wiz, Prisma Cloud, and Tenable, I analyze misconfigurations, compliance gaps, and emerging threats. • To mitigate risks, I develop strategic security measures, including automated enforcement policies, network segmentation, and threat modeling. Additionally, I collaborate with teams to implement proactive security controls, ensuring resilience against evolving cyber threats. • Oversee the deployment, configuration, and management of security tools like Wiz, Prisma Cloud, and others to ensure they are effectively protecting the environment. Keep abreast of the latest security threats, technologies, and industry trends, and apply this knowledge to improve security measures. • Oversee the deployment, configuration, and management of security tools like Wiz, Prisma Cloud, and other cloud security platforms to ensure comprehensive protection of the environment. This includes fine-tuning security policies, integrating automation for continuous monitoring, and optimizing tool effectiveness. • Stay updated on emerging threats, evolving attack techniques, and industry best practices, applying this knowledge to enhance security measures. By continuously refining security configurations and adopting cutting-edge technologies, I strengthen the organization's overall security posture. • Maintain detailed documentation of security processes, incidents, and configurations to ensure clarity and continuity in security operations. Deep understanding of cloud security best practices and architectures for Azure and AWS. • I maintain comprehensive documentation of security processes, incidents, and configurations to ensure clarity, compliance, and operational continuity. This includes tracking security incidents, documenting response actions, and updating security policies for future reference. • With a deep understanding of cloud security best practices for Azure and AWS, I ensure security architectures align with industry standards. By maintaining well-documented configurations and security controls, I support efficient troubleshooting, audits, and continuous security improvements. • Proficiency in using security tools such as Wiz, Prisma Cloud, Jira, ServiceNow, and Confluence. • Wiz: Skilled in using Wiz for cloud security risk management, vulnerability scanning, and threat detection across cloud environments, including Kubernetes and containers. • Prisma Cloud: Experienced in leveraging Prisma Cloud for cloud security posture management, container security, vulnerability scanning, and compliance monitoring in multi-cloud environments. • Jira: Proficient in using Jira for agile project management, issue tracking, and prioritizing security tasks to ensure timely resolution of vulnerabilities. • ServiceNow: Expertise in automating ITSM workflows for security incidents, managing escalation, and integrating with other tools for efficient threat response. • Confluence : Skilled in documenting security policies, process flows, and best practices, ensuring clear communication and collaboration across teams. • Strong knowledge of networking protocols, topologies, and security concepts. Meticulous attention to detail to ensure accuracy and completeness in security assessments and reporting. • Strong understanding of networking protocols (e.g., TCP/IP, DNS, HTTP/S), topologies (e.g., LAN, WAN, VPN), and security concepts (e.g., firewalls, IDS/IPS, encryption). Detail-oriented in performing comprehensive security assessments, ensuring accuracy in identifying vulnerabilities, and providing clear, actionable reporting for effective risk mitigation and compliance. • Real time troubleshooting of complex & sensitive network related issues ranging from but not limited to complete network connectivity loss, with enterprise customers like Financial Organizations, Service Providers, Universities, US Government organizations via Support Tunnel. • Proficient in diagnosing and resolving complex, time-sensitive network issues, including complete network connectivity loss, across various environments. Experienced in supporting enterprise customers such as financial institutions, service providers, universities, and U.S. government agencies through secure support tunnels. Able to troubleshoot and resolve critical issues swiftly while minimizing service disruption and ensuring the continuity of operations. • Configure masquerading and domain mapping. • Skilled in configuring network masquerading (NAT) to enable secure communication between internal and external networks. Experienced in setting up domain mapping for seamless redirection and proper DNS resolution, ensuring efficient traffic management and optimal network performance. • Configure/Disable or refining the Policy Implementation as per client approval and requirement. Share the log analysis for critical incidents with clients. DNS (Domain Name System) configuration and management is necessary for setting up DMARC records. • Proficient in configuring, disabling, or refining security policies in alignment with client approval and tailored requirements to ensure compliance and operational efficiency. Skilled in providing detailed log analysis for critical incidents, offering clients clear insights and actionable recommendations for swift issue resolution. Experienced in DNS configuration and management, including setting up and maintaining DMARC records to strengthen email security, prevent phishing attacks, and ensure proper domain authentication. • Analytical Skills: Ability to analyze DMARC reports and interpret the data to identify sources of email abuse, spoofing attempts, and compliance issues. • Strong ability to analyze and interpret DMARC (Domain-based Message Authentication, Reporting & Conformance) reports to identify sources of email abuse, spoofing attempts, and non-compliance with security standards. Proficient in extracting actionable insights from DMARC data to improve email security, mitigate risks, and ensure proper domain authentication and alignment. Skilled in identifying patterns, troubleshooting issues, and recommending improvements to enhance overall email system security. • Email Security and Cisco Advanced Malware Protection (AMP) for Endpoint console integration. Troubleshoot issues related to ASA firewall • Experienced in integrating email security solutions with Cisco Advanced Malware Protection (AMP) for Endpoint, enhancing threat detection and prevention across endpoints and email systems. Skilled in configuring and managing Cisco AMP to detect, block, and remediate advanced malware threats. Proficient in troubleshooting and resolving issues related to ASA firewalls, ensuring secure network traffic and maintaining the integrity of network perimeters. Bachelor's Degree is required in Computer Science or Computer Engineering or Information Technology
.
Software Engineer
A Software Engineer is needed to perform the following duties: Lead daily Scrum meetings and sprint planning to prioritize tasks and align technical solutions with business goals. Partner with product managers, UX, and QA teams to reduce time-to-market by 20%. Design and deploy .NET Core/Design and deploy .NET Core/C# microservices on GCP, optimizing infrastructure costs by 25% while maintaining 99.9% uptime for SaaS platforms. C# microservices on GCP, optimizing infrastructure costs by 25% while maintaining 99.9% uptime for SaaS platforms. Containerize monolithic POS systems using Kubernetes, reducing deployment failures by 40% and enabling scalability for enterprise retailers. Build RESTful APIs to integrate payment gateways, loyalty programs, and analytics tools for 5M+ retail users. Develop omnichannel POS software for Fortune 500 clients, enabling real-time inventory sync and reducing checkout latency by 30%. Architect cloud-native retail platforms on GCP handling 10k+ transactions/sec using microservices and edge computing. Engineer CI/CD pipelines with GitHub Actions, reducing release cycles from 2 weeks to 3 days. Implement Terraform (IaC) and automated security scans, reducing vulnerabilities by 50% in PCI-DSS-compliant workflows. Integrate predictive analytics tools (e.g., TensorFlow) into SaaS platforms, increasing client retention by 15%. Present cloud migration strategies at conferences, influencing internal adoption of GCP/Kubernetes standards. Troubleshoot critical issues and refine platform usability to align with evolving retail industry needs. Bachelor's Degree in Computer Science or Computer Engineering or Computer Information SystemsFax resume to HR at (732) 465-0901. EOE. No calls.
Job Opening for Business Analyst
The following website advertisement will be posted from 6/2/2025 – 6/30/2025
Business Analyst needed w/Bachelor’s Degree or Foreign Equivalent in Computer Science & Engineering or Computer Engineering or Computer Science and five (5) years of progressive work experience as Business Analyst or Sr. Business Analyst or I.T. Analyst performing following job duties or Master’s Degree or Foreign Equivalent in Computer Science & Engineering or Computer Engineering or Computer Science and one (1) year experience as Business Analyst or Sr. Business Analyst or I.T. Analyst performing following job duties:
Manage business requirements and project artifacts (use cases, Business process workflows, data/technical requirements) in project management tools. Liaise with stakeholders to analyze requirements, collaborating with DevOps, Architecture, Engineering, Database and QA teams to design solutions based on BABOK guidelines without compromising data security. Coordinate with UI/UX and technical writing teams to document technical changes and release notes. Create data mapping, wireframes and mockups for user stories. Capture and document API inputs/outputs, database tables and business rules to support API and UI development. Perform smoke/user testing to validate application functionality. Track, manage and approve defects raised by QA, ensuring timely resolution and validation.
Benefits:
Health Insurance &Health Insurance & PTO
Salary:
$152859.00 Per Year
Job Locations:
North Brunswick, NJ or client sites within the U.S.
Must be available to travel and relocate to client sites for temporary projects.
Traveling to Areas (Geographic Scope)
Travel is required to client sites within the U.S. for temporary projects based upon project length. Upon project completion, travel is required to the next client site.
Frequency
Frequency of travel to client sites within the U.S for temporary projects based upon project length will be 50%
Nature (purpose)
Purpose is for unanticipated client projects that may occur.
Mail resumes to:
Datametrics Software Systems Inc.
825 Georges Road, 2nd Floor, Suite #3, North Brunswick, NJ 08902
