OA
Posted 2 days ago
Software Engineer - AI Technologies (Remote)
Outlier AI
📍 Leicester
I.T. & CommunicationsRemote
Job description
<p><strong>About the Project</strong></p> <p> Outlier helps the world's most innovative companies improve their AI agents by providing human feedback. Do you want to <strong>shape the future of autonomous agents like OpenClaw?</strong></p> <p> We collaborate with leading AI organizations to train Large Language Models (LLMs) to function as proactive, multi-step agents. <strong>Our projects focus on teaching these systems how to design, coordinate, and optimize complex, real-world architectural workflows.</strong> </p> <p> Whether you are a passionate orchestration guru or experienced software developer - we want you to <strong>help us train the world's most advanced generative systems.</strong></p> <p> </p> <p><strong>Ideal Qualifications</strong></p> <ul> <li> 2+ years of experience in backend engineering, AI automation, or complex systems integration. </li> <li> Proven ability to build and maintain production-grade software with modular separation (e.g., distinct services for data parsing, logic processing, and reporting). </li> <li> Strong command of at least two major languages (e.g., Python, JavaScript, Go, or Java) and experience working with SQL databases. </li> <li> Practical experience building for live, non-mocked environments and handling multi-turn system interactions. </li> <li> Outstanding attention to detail and the ability to provide clear, high-density technical feedback on complex system behaviors. </li> </ul> <p> </p> <p><strong>Nice to have</strong></p> <ul> <li> Expertise building multi-stage coordination tasks where data acquisition leads to reasoned output. </li> <li> Hands-on experience integrating agents with live tools such as Supabase, Gmail, and various APIs to solve real-world problems. </li> <li> High level of comfort implementing persistent state and session discovery using MEMORY.md to track agent progress. </li> <li> Experience identifying subtle failures like privacy leaks, authority escalation, or indirect prompt injections. </li> </ul> <p> </p><img src="https://www.jobg8.com/Tracking.aspx?VZ6agKFPodv8JGcBlRdY%2f0B5mbRZVChul" width="0" height="0" />