Get new jobs by email
$2000 per year
...few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy... ..., and growing. Canonical is looking for exceptional security-focused software engineers to be integrated across product teams...$2000 per year
...possible audience as quickly as possible, with a 10 year enterprise security commitment. The Canonical Linux Kernel Organization has... ...manufacturers Diagnose and resolve issues in the kernel Take personal responsibility for a flavour of the Ubuntu Linux kernel...$2000 per year
...few office based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy... ...IoT, called Ubuntu Core, represents the state of the art in security and resilience for high end appliances and equipment. Our customers...$2000 per year
...few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy... ...or scalable web services Performance engineering and security experience What we offer you We consider geographical...$2000 per year
...few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy... ...-V Enabling Ubuntu on a wide range of embedded systems Security hardening and exploit mitigation Third-party driver integration...$2000 per year
...few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy... ...clusters. We work on compilers and toolchains, and we work on security, cryptography, performance and documentation. Some of our teams...- ...Engineer to design, build, and maintain our cloud environments. You will work with engineering teams to ensure our infrastructure is secure, scalable, and cost-efficient. Key Responsibilities Design and implement cloud architecture on AWS, Azure, or GCP. Manage...
- ...About the Role We are hiring a Network Engineer to manage our networking infrastructure, ensure uptime, and implement security controls. Your work underpins everything our distributed teams do. Key Responsibilities Design, configure, and maintain LAN, WAN, and...
- ...decentralised application frontends using Web3.js or Ethers.js. Integrate blockchain networks (Ethereum, Solana, or similar). Ensure contract security and conduct code reviews. Collaborate with product teams on tokenomics and protocol design. Requirements 2+ years of...
- ...internal and client-facing projects. Key Responsibilities Develop custom WordPress themes and plugins. Optimise site performance, security, and SEO. Integrate third-party tools and APIs. Maintain and update existing WordPress installations. Collaborate with designers...
$14 per hour
...tech-savvy, and always online to learn more, this part-time flexible project is the perfect fit for you! A Day in the Life of a Personalized Internet Assessor ● In this role, you’ll be analyzing and providing feedback on texts, pages, images, and other types of...- ...that values collaboration and creativity. Enjoy a flexible, remote-friendly work environment with established opportunities for personal growth and learning. If you subscribe to the mission of separating the dollar from the state, then we want to hear from you!...
- ...infrastructure using Terraform or similar IaC tools. Monitor system health, respond to incidents, and conduct post-mortems. Implement security best practices across infrastructure. Automate repetitive operational tasks. Requirements 3+ years of DevOps or SRE...
- ...We are looking for a Database Administrator to manage, maintain, and optimise our database systems. Performance, availability, and security are your primary responsibilities. Key Responsibilities Install, configure, and maintain relational and NoSQL databases....
- ...We are hiring a Learning and Development Specialist to design and deliver programmes that help our people grow professionally and personally. You will shape our learning culture as we scale. Key Responsibilities Assess training needs across teams and design...
- ...TELUS Health is empowering every person to live their healthiest life. Guided by our vision, we are leveraging the power of our leading edge technology and focusing on the uniqueness of each individual to create the future of health. As a global-leading health and well...
$2000 per year
...distributed collaboration, with 1200+ colleagues in 75+ countries and very few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy and execution. The company is founder-led, profitable, and...- ...About the Role We are hiring a Cybersecurity Analyst to monitor, detect, and respond to security threats. You will play a vital role in safeguarding our infrastructure, data, and users. Key Responsibilities Monitor security alerts and investigate potential incidents...
- ...background in MongoDB who will help us to build a fully managed MongoDB solution based on Juju. We're aiming to build the most reliable and secure way to deploy and operate MongoDB on machines, VMs, public cloud and Kubernetes. The MongoDB team is small, meaning you will be a...
- ...orchestration platform for DevSecOps. GitLab enables organizations to increase developer productivity, improve operational efficiency, reduce security and compliance risk, and accelerate digital transformation. More than 50 million registered users and more than 50% of the Fortune...
- ...Brave is fighting back. Join us! The Browser AI team are building core browser features, and exploring new ideas about how the personal nature of the browser can help create the best AI experience for research and creative tasks. Brave allows the user to attach tabs...
- ...acknowledge that you have read Coupa's Privacy Policy and understand that Coupa receives/collects your application, including your personal data, for the purposes of managing Coupa's ongoing recruitment and placement activities, including for employment purposes in the...
- ...standards *RESTful API development and design best practices *Scalable architecture design for high-volume data environments *Security practices and vulnerability prevention *Bug identification and resolution with local testing *Thoughtful development centered...
- ...entwickeln unser Produkt kontinuierlich weiter. Zur Unterstützung der Geschäftsführung suchen wir eine strukturierte und zuverlässige Person, die zentrale Themen in Finance, Administration und Operations übernimmt und dafür sorgt, dass das Unternehmen im Hintergrund...
- ...on the front line for VALD. As part of a truly global team, you will attend conferences and perform product demonstrations (both in-person and teleconferences) in clinical, performance, and tactical settings. You'll set up and oversee product trials, nurture new leads...Remote job
$75000 - $100000 per year
...in a team that uses modern coding practices and operates without a centralized backend, prioritizing client-side verification and security. Responsibilities Collaborate with engineers to design, implement, and ship new wallet features. Implement wallet features...- ...knowledge across all of our teams. To put people on the path to success, we nurture a culture built on trust, collaboration, and personal growth. You will often work independently, but when you’re working on a team it will be a small, feature-based, cross-functional team...
- ...CPO, and Infrastructure Architect to shape the platform’s architecture, guide the team, and move fast without compromising quality, security, or scalability.. What You’ll Do Own the architecture: Design and evolve a scalable, cloud-native platform built for high-...
$85000 - $160000 per year
...Requirements (Strict) Candidates must demonstrate: At least 10 real, personally executed OS-level shell or RCE cases in authorized enterprise... .... Required Experience 5+ years of hands-on offensive security experience Enterprise Red Team or advanced penetration...Remote job$85000 - $160000 per year
...first cybersecurity company specializing in real-world offensive security and adversary simulation. We are hiring a Cyber Security... ...Requirement: Candidates must demonstrate at least TEN (10) real, personally executed OS-level shell/RCE exploitation cases in authorized...Remote job
