The primary responsibility of the Lead Software Engineer is to serve as an expert technical resource overseeing architectural design and implementation of software and technologies while acting as a hands-on leader of a small team of engineers. As a member of the DCI team, this individual will spend their time contributing to high quality, testable software solutions used across the DCI Software product line. The Lead Software Engineer will serve as a technology leader, and be the final escalation point for production issues and serve as a primary decision maker of technology choice across the DCI Software product line. Work with software development, QA, and DevOps teams to produce high quality technology solutions Lead a small team to design and develop solutions to DCI Software’s biggest technical opportunities. Mentor less senior engineers as needed Build modern, architecturally sound components, tools and applications to meet mission-driven strategic business goals Infuse quality of service characteristics, such as scalability, manageability and maintainability, into distributed frameworks to create or expand business or technical capabilities Employ industry best practices to evaluate, correct and prevent vulnerabilities during the software development process Serve as a leader, encouraging a culture of innovation and accountability while adhering to Agile best practices Research and prototype new or alternative software solutions to improve the quality of our developed products Assist in process development and enhancement in accordance with ITIL best practices Additional projects or duties as assigned ALL DCI employees will be vigilant to support the positive compliant cybersecurity company posture by familiarizing themselves with all policies, procedures, standards, and guidelines and act accordingly. This position is expected to exert the utmost care, due diligence, and ensure the proper compliance for all computer, server and cloud systems. This position is trusted to ensure proper protections for all sensitive information created, stored, transmitted and otherwise processed by supporting barriers deterring unauthorized access, recognizing and reporting problems that are uncharacteristic of business activity and known and as-yet unrecognized vulnerabilities and risks in hardware and software. This position will support the management and monitoring of any attacks and intrusions, forensics and subsequent activities.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed