Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Oracle Applications Developer

Job Title: Oracle Applications Developer
Contract Type: Contract
Location: Sweden
Industry:
Salary: €45 - €50 per hour + + Expenses
Start Date: ASAP
Duration: 12 month (ext)
REF: OAD021_1490174593
Contact Name: Alex Woodrow
Contact Email: alexw@montash.com
Job Published: 7 months ago

Job Description

This opportunity is working for one of the largest FMCG clients in the world!

Role description:

  • Technical role for Oracle Applications; designs, develops and supports application solutions to meet client requirements.
  • This Role would be responsible for design, development and testing of reports, interfaces, data conversions and enhancements using Oracle tools including the following: Oracle Designer, Discover, Forms, JDeveloper, and Reports.
  • This role may design, develop and/or re-engineer highly complex application components, and integrate software packages, programs, and reusable objects residing on multiple platforms.
  • Experience in SOA, OSB and/or ODI also required

Remote working (80% on site, 20% from home) is acceptable.

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...