Quality Assurance Analyst (Advanced) - Hybrid, Columbia SC
Location: Columbia, South Carolina (Hybrid: 3 days on-site, 2 days remote)
Type: W2 Contract (no third party candidates please)
Duration: Long-term engagement
About the Role
We're seeking an experienced Quality Assurance Analyst (Advanced)to join a team supporting large-scale healthcare and public-sector initiatives. This role is hybrid, based in Columbia, SC, and offers the opportunity to work on complex, mission-driven projects that directly impact the state's healthcare programs.
If you enjoy problem-solving, designing robust test cases, and improving the quality of enterprise systems, this role provides a chance to make a meaningful impact while collaborating with diverse stakeholders.
What You'll Do
Required Skills
Preferred Skills
Education
...a deep sense of responsibility, partnering across engineering, research, and security to deliver real-world impact. About the Role... ...veteran status, disability, genetic information, or other applicable legally protected characteristic. For additional information, please...
...concise design System to build powerful and consistent frontend applications. + Identify problems and opportunities, propose and develop simple and attainable solutions to improve the team's development process and product quality + Be the role model in establishing...
...Position: Private Driver Company Overview: Confident Staff Solutions is a leading staffing agency that provides top-notch professionals to various industries. We are currently seeking a highly skilled and experienced Private Driver to join our team and provide...
...business process outsourcing services, dedicated helping the world's leading companies build stronger businesses. Job Title: Scrum Master / RTE Work Location: Liberty, NC Job Type: Temporary Assignment Work Type: Onsite Duration: 12+ Months...
...Forensic Review of various platforms to include Windows, Linux, and Mac OS based systems using a variety of digital forensic tools. Investigate suspected instances of computer, mobile device, and network penetrations. Ingest media into an archive, copy media images, and...