ExecRecruitment is a global professional services provider and contingency staffing company. Our main objective is to source top talent and support professional growth.
One of our direct clients is actively seeking a Scrum Master to join their team. The Scrum Master will lead the team and acts as a product owner. This person is responsible for delegating tasks appropriately, encouraging collaboration, and coordinating the correct deliverables in a timely manner. The ideal candidate is tactful and passionate about helping others. This person will lead by example and influence the team to share experiences with their peers. The ideal Scrum Master has a comprehensive understanding of scrum methodology and its guiding principles. He/she will ensure the entire team supports the implemented Scrum process and coach the team members on Agile methodologies. Job Title: Application Programmer
Requirements
Dietary AideRM Management is seeking a dietary aide to join our team. As a dietary aides you are responsible for providing food service to the tenants of RM Management in a positive and friendly manner. Services may include - related services, set-up and clean-up of...
...Independent Route Delivery Contractor Belmont, New Hampshire Service Area: Belmont, NH 03220 Position Type: Independent Contractor (1099) Daily Pay: $100 per route day Start Date: Immediate West Franklin Investments LLC is seeking dependable, self-motivated...
...A reputable hospital system with locations throughout Illinois has an opening for a BC/BE Nocturnist to join a team in Springfield, IL... ...Springfield, Illinois This historic and thriving city is the state capital of Illinois and offers many big-city amenities and a small...
...Role Overview Zoe Feldman Design is searching for a creative and motivated Design Intern to join our team in the Georgetown office for a six-month internship program... ...or recently earned a bachelors degree in Interior Design, Interior Architecture, Architecture , or...
...The Computer Network Defense Analyst uses information collected from a variety of sources to monitor network activity and analyze it for evidence of suspicious behavior. Monitoring and analysis are performed to identify and report events that occur, or might occur, within...