Skip to main content

Data analysist的工作

发信人: zlaotu (美国老土), 信区: JobHunting
标  题: Re: 这里有没有人做过做Data analysist的工作
发信站: BBS 未名空间站 (Fri Mar  2 09:58:46 2012, 美东)

Database Analyst/Business Analyst/System Application Analyst/Reporting
Engineer/Price Analyst/Work Force Analyst/Source Analyst/Market Analyst

All these kind of titles meant the same thing.

Database Analyst is one of the best job you should looking for.

Not need a formal CS degree. Any kind of degree will be OK.

Specially for a MBA, this job is perfect.

Database Analyst is listed as one of the high pay job in 2012 by US News.

The salary range is between $50k to $120k.

There are so many Database Analyst jobs open in many USA large/small
companies, like: 学校,银行,保险,通讯,运输,医院,政府,食品,法律,房地产,高科技,
等等, 决不局限在那少之又少的软件公司.

大部分 Database Analyst job 不要 SAS, 不用统计.

It takes many people three to six month to pick up the skill and start
looking for the job.


【 在 Paris1981 (winnie) 的大作中提到: 】
: 一般做这种position的需要多少经验才可以找到类是的工作?
: 在站内联系一下。thanks.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...