Primajte oglase za posao imejlom
- ...entities We’re a fast-growing team with a passion for innovation, security, and scalability. Our culture values curiosity, collaboration,... ..., GCP, Azure) and DevSecOps principles: experience in building secure SDLC and enable DevSecOps processes Experience in building...
- ...Integrate Asterisk via AMI / ARI and maintain CDR / CEL data pipelines; Troubleshoot call-flow, audio, and codec issues; Ensure security and monitoring using TLS, Fail2Ban, Prometheus, and Grafana. Requirements Solid experience with Asterisk 18+ (22 preferred);...
- ...pool of target media resources and establishing professional contacts with authors and editors. Initiating collaborations aimed at securing organic product mentions in editorial content. Organizing the shipment of product samples to authors and editorial offices....
- ...services Assisting with rollouts for business-critical network infrastructure, products, and services. Ensure the integrity and security of data in accordance with best practices and business requirements for regulatory, security and privacy compliance Produce and...
- ...Alternative payment methods (APMs) Corporate accounts for legal entities We’re a fast-growing team with a passion for innovation, security, and scalability. Our culture values curiosity, collaboration, and impact - and we’re looking for talented professionals who are...
- ...for: As a Full-Stack WordPress Website Developer at Wisevu, you will play a key role in building and maintaining high-performance, secure, and user-friendly WordPress websites for our clients. You will work closely with other developers, designers, project managers, and clients...
- ...Alternative payment methods (APMs) Corporate accounts for legal entities We’re a fast-growing team with a passion for innovation, security, and scalability. Our culture values curiosity, collaboration, and impact - and we’re looking for talented professionals who are...
- ...PBI Axiom, PBI Vector , and PBI Stratus . Our offerings ensure improved data workflow, data analytics, data governance, and data security for buy-side firms. More than 175 top-tier hedge funds, asset managers, family offices, funds of funds, and institutional investors have...
- ...PBI Axiom, PBI Vector , and PBI Stratus . Our offerings ensure improved data workflow, data analytics, data governance, and data security for buy-side firms. More than 175 top-tier hedge funds, asset managers, family offices, funds of funds, and institutional investors have...
- ...PBI Axiom, PBI Vector , and PBI Stratus . Our offerings ensure improved data workflow, data analytics, data governance, and data security for buy-side firms. More than 175 top-tier hedge funds, asset managers, family offices, funds of funds, and institutional investors have...
- ...experience is mainly in web hacking, you should instead apply for the on-demand penetration testing position, which focuses more on web security. Responsibilities Reverse engineer game binaries and networking to map protocols. Bypass client-side protections (SSL...
- ...PBI Axiom, PBI Vector , and PBI Stratus . Our offerings ensure improved data workflow, data analytics, data governance, and data security for buy-side firms. More than 175 top-tier hedge funds, asset managers, family offices, funds of funds, and institutional investors have...
- ...collaborate closely with Frontend/Backend Developers, QA, and Group DevOps to ensure that application platforms and pipelines are reliable, secure, and performant. Experience with technologies such as Apache Kafka, Redis, Kong, and ClickHouse is highly valued....
- ...troubleshoot connectivity. ~ Competence in PowerShell scripting for automating tasks and managing the Windows environment. ~ Knowledge of security best practices, including patching, user/group management, and security protocols. ~ Experience with Service Desk systems (e.g....
- ...motivated, and lateral thinker, our team is waiting to meet you! This is a project based position, ideal for someone skilled in web security, mobile hacking, and basic cloud security. It does not require deep knowledge of reverse engineering or low-level networking....

Napravite profesionalnu radnu biografiju besplatno za 5 minuta
- ...operate in 30+ countries and from 90+ countries, and support customers in 60 languages, helping SaaS, software, and hardware brands deliver secure, world-class customer and technical support. Right now, we’re expanding our talent bench — a pool of skilled Customer Support...
- ...Alternative payment methods (APMs) Corporate accounts for legal entities We’re a fast-growing team with a passion for innovation, security, and scalability. Our culture values curiosity, collaboration, and impact - and we’re looking for talented professionals who are...
- ...PBI Axiom, PBI Vector , and PBI Stratus . Our offerings ensure improved data workflow, data analytics, data governance, and data security for buy-side firms. More than 175 top-tier hedge funds, asset managers, family offices, funds of funds, and institutional investors have...
- ...is a digital transformation and technology consulting company that delivers services across software engineering, data, cloud, AI, security, and managed services . We are a technology partner that helps organisations drive innovation, build resilience, and modernise their...
- ...environment. We do not discriminate based on any characteristic protected by the law. Candidate privacy is respected, and all data is securely stored and used solely for recruitment purposes, in line with GDPR and our internal policies. Unsuccessful applicants may have their...
- ...are seeking a talented Linux Engineer to manage and maintain Linux-based systems and infrastructure, ensuring optimal performance, security, and reliability. Main Responsibilities Maintain, update, and troubleshoot Fedora- and Amazon Linux-based servers to ensure...Rad od kuće
- ...Service leader, partnering with tech companies and industry leaders like MasterCard, Calm and MacPaw in 30+ countries since 2010 to deliver secure customer and technical support. We operate globally, supporting clients in 60 languages across diverse industries. So what if you had...
- ..., and we deliver high-volume, low-cost Linux infrastructure and security products that help companies to increase the efficiency of their... ...design, build, and operate a centralized platform that serves as a secure and reliable entry point for outgoing email traffic. You will...
- ...principles: do the right thing, employees first, we are remote first, and we deliver high-volume, low-cost Linux infrastructure and security products that help companies to increase the efficiency of their operations. Every person on our team supports each other and does what...
- ...environment. We do not discriminate based on any characteristic protected by the law. Candidate privacy is respected, and all data is securely stored and used solely for recruitment purposes, in line with GDPR and our internal policies. Unsuccessful applicants may have their...Rad od kuće
- ...Imunify360 Security Suite is a product of CloudLinux Inc. , the maker of the #1 OS in security and stability for hosting providers. Imunify is an innovative security solution designed specifically for shared and VPS/Dedicated servers. The automated, easy-to-use solution...
- ...implementation of AI-driven features using APIs like OpenAI or Gemini. Infrastructure Impact : Work with AWS to keep our systems secure, scalable, and lightning-fast. Code Quality & Performance : Improve- and keep our codebase clean, efficient, and easy to build...
- ...adoption of standards to maintain high code quality. Investigate and promptly address bugs to uphold platform reliability. Ensure security and compliance by following best practices for securing web applications and adhering to relevant regulations. Stay abreast of the...
- ...principles: do the right thing, employees first, we are remote first, and we deliver high volume, low-cost Linux infrastructure and security products that help companies to increase the efficiency of their operations. Every person on our team supports each other and does what...
- ...integration tests to maintain code quality Investigate and promptly fix bugs to maintain the reliability of the platform Ensure security and compliance by following best practices for securing web applications and adhering to relevant regulations in handling sensitive...