Computer Programmer A Computer Programmer creates, modifies, and tests the code, forms, and script that allow computer applications to run. Computer Programmers write, analyze, review, and rewrite programs, using workflow chart and diagram, and applying knowledge of computer capabilities, subject matter, and symbolic logic. They design solutions that comply with systems...
Construction Worker (Building) A Construction Worker assists tradesmen and machine operators in construction projects like erect and break up scaffolding, ramps, unload and carry materials at construction sites. Construction workers use equipment to break old forms and structures, prepare and apply construction materials to build structures or fill gaps (e.g cement), clean...
Credit Investigator A Credit Investigator investigates history and credit standing of individuals or business establishments applying for credit. Credit Investigators obtain information about potential creditors from banks, credit bureaus, and other credit services, and provide reciprocal information if requested. They conduct complete background and credit investigation checks e.g., identity, residence/ neighborhood,...
Customer Service Associate A Customer Service Associate assists customers with any inquiries while ensuring the highest standards of customer service are met. Customer Service Associates may handle customers in person or on a variety of channels such as phone, email, and social media. Depending on the industry and company, duties vary from...
Customer Service Representative A Customer Service Representative interacts with customers on a variety of channels such as phone, email, and social media, and ensure that all valid customer concerns are being dealt with immediately including inquiries about products and services and complaints. Customer Service Representatives build sustainable relationships of trust through open...
Cyber Security Specialist A Cyber Security Specialist is an expert in the field of information technology security. Their job entails providing protection during software development. They work to make sure that networks are safe from external threats like hackers or crackers who want access for malicious purposes.