• Security Clearance Prefered / U.S Citizenship Required • Knowledge of Python and Elasticsearch • 5 yrs+ of relevant experience
Henry Hire Solutions’ Post
More Relevant Posts
-
Founder at SkilldLabs | Connecting Tech Companies to Top Nearshore Teams | Startup Advisor | ex-Accenture
Hiring Hack Remove all the numbers from your job description and see what happens. ❌ 10+ years Java experience vs ✅ Resident expert in Java Recent studies have show that minorities and women are LESS likely than men to apply for a job when they do not meet the requirements 100%. Awareness is key. Challenge the norm.
To view or add a comment, sign in
-
#HiringAlert #PythonDeveloper Location-Chennai/Bangalore Experience 3-6 years Good with Python and Linux Rest API Flask NP-0-30 days (Max) (serving) Refer/ Apply on sweta.rathore@ltimindtree.com #python #linux #chennai #bangalore #pythonjobs #pythonprogramming #pythondjango #chennaiopenings #chennaihiring
To view or add a comment, sign in
-
Java Fullstack Developer || JAVA | MY SQL | ANGULAR | SPRING BOOT | HIBERNATE | JAVASCRIPT | PYTHON | DART | GIT
Java Compiler
To view or add a comment, sign in
-
Excited to share the successful completion of Task 3 at Level 2 at Cognifyz Technologies focusing on file encryption and decryption using Java! 🚀 ✨ Task Summary: Delighted to present a Java program capable of encrypting or decrypting text files using a straightforward encryption algorithm. The program prompts the user to select encryption or decryption, input the file name or path, performs the chosen operation, and saves the result to a new file. Key Features: File Handling: Leveraged Java's file handling capabilities to manage file operations efficiently. String Manipulation: Employed Java's string manipulation features for encryption and decryption processes. Input/Output Operations: Implemented user-friendly prompts and file-saving functionalities using Java's input/output utilities. 🔍 Skills Demonstrated: Java Programming: Utilized core Java concepts to develop a robust file encryption/decryption application. Algorithm Implementation: Implemented a simple yet effective encryption algorithm suitable for text file encryption. Problem-Solving: Addressed file handling complexities and user input scenarios to ensure smooth program execution. #FileEncryption #Decryption #SoftwareDevelopment #Coding #Cybersecurity #cognifyztechnologies #cognifyz #cognifyztech #internship Training and Placement Cell, VVIT PURNEA #linkedin
To view or add a comment, sign in
-
TVS Motor Company Ltd.Co - IT Department (D / AI ) . Aspiring Software Developer . graduate from anna university , Chennai . Academics in Senthil matric higher secondary school , Dharmapuri .
🌍 Lets Learn :- 💻 Java :- 📖 Duck_Number Program :- Explanation :- 1) n is initialized to 10. This is the number we are checking to see if it's a duck number. 2) duck is a boolean variable initialized to false. This will be used to indicate whether the number is a duck number or not. 3) The loop continues as long as n is greater than 0. 4) d = n % 10; extracts the last digit of n. 5) If the last digit (d) is 0, the duck variable is set to true, and the loop breaks, indicating that a zero was found in the number. 6) n /= 10; removes the last digit from n (integer division by 10). 7) If duck is true, it prints "duck", indicating that the number contains at least one zero (though this does not fully conform to the definition of a duck number which requires the zero not to be the first digit). 8) If duck is false, it prints "no duck", indicating that there are no zeros in the number. #java #numbers #numbersprogram #Learning #Fresher #Primitivedatatypes #javafullstack #javadeveloper #seekingfornewoppurtunities #Career #Softwaredeveloper #pattern #Numberpattern #Coding #javapattern #javanumberpattern
To view or add a comment, sign in
-
C || C++ || CORE JAVA || OOPS || DSA || HTML || CSS || JS || SQL || MERN STACK || BOOTSTRAP || GIT-HUB
#Day11 Solving #dsawithjava Problems on LeetCode!!!!!! You are given an integer array height of length n. There are n vertical lines drawn such that the two endpoints of the ith line are (i, 0) and (i, height[i]). Find two lines that together with the x-axis form a container, such that the container contains the most water. Return the maximum amount of water a container can store. Notice that you may not slant the container. Example 1: Input: height = [1,8,6,2,5,4,8,3,7] Output: 49 Explanation: The above vertical lines are represented by array [1,8,6,2,5,4,8,3,7]. In this case, the max area of water (blue section) the container can contain is 49. Example 2: Input: height = [1,1] Output: 1 Constraints: n == height.length 2 <= n <= 105 0 <= height[i] <= 104 #leetcode #javadeveloper #DSA #fullstackdeveloper #gfg #lookingopportunities #fresher #dsawithjava #amanpandey #mastek LeetCode Mastek Aman Pandey Java Developer
To view or add a comment, sign in
-
Java, Data Analyst, Devops, Python, servicenow Developers, Salesforce who can work on w2 OR c2c can send their resumes
Hi All, This is Ajay from Unisys. We have a new Hybrid :: Java Developer With Python, AWS at New York. Please forward your updated resume to Kaki.Ajay@unisys.com if you are in the market. Note: Only 10+ years resumes hashtag hashtag hashtag #c2c hashtag hashtag hashtag #c2crequirements hashtag hashtag hashtag #c2cvendors hashtag hashtag hashtag #c2chotlist hashtag hashtag hashtag #c2cjobs hashtag hashtag hashtag #c2chiring hashtag hashtag hashtag #vendormanagement hashtag hashtag hashtag #vendorlists hashtag hashtag hashtag #vendorslist hashtag hashtag hashtag #javafullstackdeveloper hashtag hashtag hashtag #javafullstack hashtag hashtag hashtag #javadeveloper hashtag
To view or add a comment, sign in
-
Java RCE Scenarios https://lnkd.in/dQPbKZie Remote Code Execution (RCE) in Java applications occurs when an attacker exploits a vulnerability to execute arbitrary code within the application's runtime environment, typically through user inputs or external data. Common scenarios include deserialization of untrusted data, unsafe reflection, or injection flaws, where malicious payloads bypass security measures. These vulnerabilities often stem from insecure coding practices, outdated libraries, or improper handling of external inputs. Once exploited, RCE can lead to full system compromise, unauthorized data access, and control over the affected application, posing significant security risks. Regular updates, code reviews, and secure coding practices are essential to mitigate these threats. Other Series👇 File Upload Vulnerabilities: https://lnkd.in/dTDnPE2C Attacking Nginx: https://lnkd.in/dX98Rgzw Attacking Openstack: https://lnkd.in/d7JhVxXq Attacking CI/CD: https://lnkd.in/d7_tnSAa Attacking Pipeline: https://lnkd.in/d4RsJDD7 Attacking Policy: https://lnkd.in/dJHRvYdV Attacking IaC: https://lnkd.in/dU4cnVKZ Attacking Vagrant: https://lnkd.in/df9z6q2f Attacking Kubernetes: https://lnkd.in/gF2qcagq Attacking Docker Container: https://lnkd.in/dU_5EeyE Attacking Go: https://lnkd.in/dGN3m-QC Attacking .NET: https://lnkd.in/dQGGaHud Attacking Java: https://lnkd.in/dUufMn9E Attacking PHP: https://lnkd.in/ddcQVsFK Attacking NodeJS: https://lnkd.in/g2ZG9HvN Attacking APIs: https://lnkd.in/d7pidVk4 Attacking IOS: https://lnkd.in/dGaJ3Ybe Attacking Android: https://lnkd.in/d2FTrwkY Attacking Docker Container: https://lnkd.in/dtq7NJKN Attacking AWS: https://lnkd.in/dGt7MgtR #java #rce #deserialization #json #yaml #devops #devsecops #appsec #bugbountytips
To view or add a comment, sign in
-
Tech-Savvy Graduate | Frontend Developer, AWS, Cloud Computing |Java Full-stack developer | core Java | Ready to Innovate
Interview questions on method overloading in java. 1. what is method overloading? Ans: Method overloading in java is defined as multiple methods with the same name inside the same class is known as method overloading. 2. How this naming confusion is overcome and how many points are there? Ans: we can overcome naming confusion in java by using three points. they are I. check for the name of method II. Number of parameters of a method III. Type of parameters of a method 3. what is overloaded in method overloading? Ans: Nothing is overloaded it is just an illusion of a programmer that one method is doing all work. 4. Give me an example of compile time polymorphism? Ans: Example for compile time polymorphism is Method overloading. 5. what is static binding? Ans: Static binding refers to the process where the compiler determines which method to call during compile time. It is also called as early binding because the binding occurs at early stage(during compilation). 6. What is Dynamic binding? Ans: Dynamic binding occurs when the method to be called is determined at run time. It is also called as late binding because binding happens later i.e during program execution. 7. will the return type is participates in method overloading? Ans: No. Return type doesn't participate in method overloading. #java #fullstackdeveloper #corejava #frontend developer #learning #codinglife #codingchallenges #github #LinkedIn #fresher #opentowork
To view or add a comment, sign in
14,895 followers