Back to careers

Mid Full-Stack Developer

Location:
Hybrid — UK based, Newcastle / North East preferred
Contract type:
Full Time

Once you apply you will get a response from us within 72 hours, if you do not get a response sadly you have been unsuccesful. We do try to respond to people personally but sometimes this does not happen.

Job Description

As a Consulting Analyst, you will play a pivotal role in our consultancy team, contributing to research, data analysis, and market studies that inform strategic decision-making. Your insights will directly impact client recommendations, supporting our commitment to delivering informed and effective solutions.

Join the team

Build and maintain modern applications across backend and frontend systems in a collaborative environment.

Shape is hiring a Mid-Level Full-Stack Developer to contribute to complex, client-facing software systems.

Responsibilities include:

  • Designing and implementing scalable APIs and services
  • Developing responsive frontends using Flutter or web frameworks
  • Participating in architecture discussions
  • Ensuring performance, reliability, and secure coding
  • This role is ideal for developers with 2–4 years of full-stack experience.
Frequently asked questions

Our guide to Frequently Asked Questions. Explore answers to common queries and empower your decision-making for a seamless collaboration.

Read More
How do I start a software development project with Shape?

Get in touch with us!

We begin with a discovery session to understand your goals, challenges, and users. From there, we propose a tailored plan and timeline before kicking off the design and development phases.

How do you ensure security and compliance

Threat modelling begins with understanding your system and the risks it faces. While it starts before any code is written, it’s revisited throughout development to address emerging risks. It involves the development team planning how data will flow through the system. They identify potentially sensitive data, such as personal or financial information, and define trust boundaries – points where data crosses between components or users with different levels of trust. Anything crossing a trust boundary is treated as potentially untrusted, requiring security controls like authentication, encryption, and input validation.

Can you integrate new software with my existing systems and tools?

We have extensive experience building custom integrations that connect your new software with existing platforms, delivering seamless and efficient workflows.