Get new jobs by email
- ...Eazy Network Solution Inc. is a technology solutions provider focused on helping organizations simplify their operations, strengthen security, and scale their IT capabilities with intelligent and reliable infrastructure solutions. The company combines modern technologies...
- ...few months. Join us!! We are looking for a Senior/Staff Security Engineer to join us on this exciting journey, ensuring the security... ..., is highly desirable. ~ Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field. ~ Industry...
- ...support to enhance the digital infrastructure and information security operations of Life Spring Development Foundation (LSDF). Key... ...services. Qualifications and Experience A bachelor's Degree in computer science, Information Technology, Information/Cyber Security or...
- ...We are seeking a highly skilled and experienced Application Security Engineer to join our dynamic team. The ideal candidate will play... ...this role, we think you should have Bachelor’s degree in Computer Science, Information Security, or related field. Proven experience...Remote job
- ...systems' scalability, reliability, and security. You will contribute in driving automation... ...issues related to cloud infrastructure, network connectivity, and application... ...and Experience: Bachelor's Degree in Computer Science, Information Technology, or a related...
- ...Provide remote IT support for hardware, software, and network issues Monitor and maintain performance and security of the healthcare practice’s IT infrastructure... ...controls Resolve technical issues related to computer systems, software, and peripherals Build and...
- ...as possible, with a 10 year enterprise security commitment. The Canonical Linux Kernel... ...silicon and cloud partners Confidential computing and next-generation security primitives... ..., SECCOMP, namespaces and more Networking - in particular performance and security...
- ...Google Cloud Platform (GCP) infrastructure is secure, scalable, and resilient — powering... ...Compliance & Governance: Enforce IAM, network, and data protection standards within GCP... ...Monitor and optimize GCP spend across compute, storage, and database workloads. Introduce...
- ...brilliant people You have a Bachelor’s degree in Computer Science, STEM or similar You have experience... ...with graphics stacks Good understanding of networking - TCP/IP, DHCP, Basic understanding of security best practices in IoT or server environments Good...
- ...deliver open source to the world faster, more securely, and more cost-effectively than any... ...(or equivalent) and a background in Computer Science Exceptional academic track record... ...cloud computing technologies, including networking, storage, containers and K8S...
- ...such as new hardware accelerators, AI stacks, confidential computing, networking, virtualization, and containerization stacks, are optimized... ...toolchains Package management and dependencies Platform security (secure boot, FDE, Ubuntu Core, Confidential Computing) ~...
- ...completely new app experience and an expanded network of wellbeing partners. THE OPPORTUNITY... ...and develop APIs. Ensure APIs are secure, scalable, and performant. Ensure seamless... ...Bachelor’s or Master’s degree in Computer Science, Mathematics, Statistics, Engineering...Remote job
- ...deliver open source to the world faster, more securely, and more cost-effectively than any... ...(Docker, LXD, Kubernetes, etc.) Solid networking background and experience Experience... ...Puppet, et al.) Working knowledge of cloud computing Experience with software packaging (...
- ...will lead the organization's efforts to secure and grow institutional funding to sustain... ...and databases Proactive outreach and networking with donors and stakeholders (for... ...functions. This position requires: ● Computer work and concentrated reading, sitting for...Remote job
- ...software provides ERP features (timesheets, billing…) and creates a network between all stakeholders (services companies, their clients &... ...with internal and external APIs and SAAS Refactoring, security patches and upgrade the platform Code Review #128105;&...Remote job
- ...job: Discover more Job search subscription Laptop computers and accessories Public speaking coaching Office supplies... ...listing Career coaching Career change consultation Networking event tickets Career development resources Paid job plans...
- ...responsible for driving technology vision, delivering scalable and secure solutions, and leading engineering and product teams. The... ...checks. Preferred Qualifications: Advanced Degree in Computer Science, Engineering, or related field. Experience in FinTech...
- ...deliver open source to the world faster, more securely, and more cost-effectively than any other... ...results Extensive knowledge of cloud computing concepts, technologies & operation Practical knowledge of Linux networking, routing, and firewalls, internet transit and...
- ...3k - €94.3k (Gross 2, annual) Job requirements A degree in Computer Science, Software Engineering, or a related field. Minimum 5... ...frameworks. Familiarity with static code analysis tools and secure development practices, with understanding of security standards...
- ...interests. We believe that open source is just starting to transform the tech sector and enterprise compute. Our goal is to make open source easier, more reliable and more secure for deployment and development. We strive to be the provider of ‘most software to most...
- ...FinTech, HealthTech, EdTech, Logistics Tech) Generated significant revenue streams and secured strategic investments Maintained direct access to high-value leads and investor networks Built, scaled, and monetized global operations with measurable business impact...
- ...offerings, including a completely new app experience and an expanded network of wellbeing partners. THE OPPORTUNITY We are hiring a... ...requirements WHO YOU ARE Master’s degree (or PhD) in Computer Science, Data Science, Machine Learning, Statistics, or a...Remote job
- ...track record of building revenue pipelines, scaling teams, and securing high-value partnerships. This role is responsible for defining... ..., joint ventures, and high-value collaborations. Leverage network to create new revenue opportunities and expansion avenues. Act...
- ...The ideal candidate will present curated investment offerings, secure commitments, and nurture strong long-term investor relationships... ...teams and legal/compliance partners. Build visibility and networks within investor circles, locally and internationally, including...
- ...leader who has designed, implemented, and managed highly available, secure, and automated infrastructure across AWS, Azure, and GCP. You... ...best practices: IAM, RBAC, encryption, key management, and network security. Follow and enforce compliance standards such as OWASP...
- ...implement website optimizations Ensure data compliance and security in accordance with HIPAA and healthcare IT best practices Stay... ...(mandatory) Personal device/laptop (mandatory) Strong computer literacy Role-Specific Skills: Expertise in SEO, SEM, and...
- ...institutions. The role requires leveraging existing pipelines and networks, while sourcing new business opportunities to deliver high-... ...to build client portfolios, leverage existing pipelines, and secure high-value contracts across private sector and government institutions...
- ...be responsible for ensuring the availability, performance, and security of our infrastructure while enabling rapid, safe deployments... ...Terraform/OpenTofu for infrastructure-as-code. Familiarity with networking, load balancing, and monitoring in cloud environments....Remote job
- ...Python 2.7, Python 3.6 → 3.12, modern async frameworks, distributed computing tools, and advanced backend architecture. This role requires... ...who has architected and delivered cloud-native microservices, secure enterprise platforms, complex business-logic–driven systems,...
- ...independent index, a browser-native crypto wallet, and a private ad network (opt-in!) that directly rewards you for your attention. And we’... ...desktop browser. Work together with our developers and privacy/security experts to help us create new premium products and take our...