Get new jobs by email
- ...to align on strategy and execution. The company is founder-led, profitable, and growing. Canonical is looking for exceptional security-focused software engineers to be integrated across product teams. While they also contribute to the product as engineers, their primary...
- ...you to progress your application based on your personal interests. Canonical prefers Golang for software where performance and security are primary considerations. We also have substantial projects in Python, C, C++ and are starting to invest in Rust. For front-end...
- ...workflows. -Research and test new AI tools and technologies. -Train internal teams on AI usage and best practices. -Ensure secure, responsible, and effective use of AI tools. [Apply now at ; JOB REQUIREMENTS: Requirements -Degree in Computer Science...
- ...simultaneously working to decarbonize it. GE Vernova helps customers power economies and deliver electricity that is vital to health, safety, security, and improved quality of life. GE Vernova is headquartered in Cambridge, Massachusetts, U.S., with more than 80,000 employees...Remote job
- ...packaging and distribution mechanisms Understanding of build systems and toolchains, including for cross-compilation Performance or Security Engineering experience What we offer you We consider geographical location, experience, and performance in shaping...
- ...across hybrid landscapes. The role supports enterprise-wide digital transformation initiatives by maintaining robust, scalable, and secure Java-based solutions that align with S/4HANA’s modern architecture and business processes. Responsibilities: Maintain and...
- ...cutting-edge data center projects across the U.S. In this role, you will be responsible for modeling, designing power distribution, security, and life systems, standby generators and UPS systems, performing calculations, preparing technical documentation, and ensuring...Remote job
- ...Highly concurrent, distributed systems Performance engineering – from kernel to web – benchmarks, optimization Software security – fuzzing, tabletop threat models, analysis, audit Build systems and toolchains, including for cross-compilation Public clouds...
- ...styles, and interests in order to provide the best learning outcomes possible. Regular students also provides teachers with financial security since your weekly schedule will be consistent and reliable. Because of our model of pairing students with teachers, all of our...Remote job
- ...silicon companies - to ensure that their work reaches the widest possible audience as quickly as possible, with a 10 year enterprise security commitment. The Canonical Linux Kernel Organization has teams in every time zone. We have opportunities for technical...
- ...standards *RESTful API development and design best practices *Scalable architecture design for high-volume data environments *Security practices and vulnerability prevention *Bug identification and resolution with local testing *Thoughtful development centered...
- ...connected devices and industrial PC's. Our edition of Ubuntu tailored for IoT, called Ubuntu Core, represents the state of the art in security and resilience for high end appliances and equipment. Our customers include global brands in consumer and industrial electronics...
- ...Experience with Debian/Ubuntu packaging Experience with systems programming or scalable web services Performance engineering and security experience What we offer you We consider geographical location, experience, and performance in shaping compensation...
- ...are one of the world's leading AI and digital infrastructure providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. our consulting and Industry solutions help organizations and society move...
- ...preference ranking (factuality & locality), prompt-response writing, grammaticality checks, provision & improvement of text. Note: Please do not use VPNs or IP-masking tools during the recruitment process — our security system requires accurate regional verification....
- ...CPO, and Infrastructure Architect to shape the platform’s architecture, guide the team, and move fast without compromising quality, security, or scalability.. What You’ll Do Own the architecture: Design and evolve a scalable, cloud-native platform built for high-...
- ...RISC-V boards, all the way up to supercomputers, clouds and Kubernetes clusters. We work on compilers and toolchains, and we work on security, cryptography, performance and documentation. Some of our teams focus on packaging thousands of pieces of software, others focus...
- ...in a team that uses modern coding practices and operates without a centralized backend, prioritizing client-side verification and security. Responsibilities Collaborate with engineers to design, implement, and ship new wallet features. Implement wallet features...
- ...background in MongoDB who will help us to build a fully managed MongoDB solution based on Juju. We're aiming to build the most reliable and secure way to deploy and operate MongoDB on machines, VMs, public cloud and Kubernetes. The MongoDB team is small, meaning you will be a...
- ...partner platforms Developer platforms such as Raspberry Pi and RISC-V Enabling Ubuntu on a wide range of embedded systems Security hardening and exploit mitigation Third-party driver integration and distribution, such as graphics Expanded driver support...
- ...application, please click the "Apply" button online. All applications are carefully considered and your details will be stored on our secure Application Management System. This is used throughout Johnson Matthey for the selection of suitable candidates for our vacancies...Remote job
- ...instructions for writing API requests and understanding responses. Operations documentation: Create upgrade guides, installation guides, security handbooks and other related documents for operations teams. Architecture documentation: Document our complex platform...Remote job
- ...APPXML definitions Collaborate with internal teams and vendors on system improvements Ensure compliance with architecture, security, and IT standards Support release cycles, upgrades, and regression testing Participate in on-call rotations when required...
- ...object storage (MinIO/S3), and distributed systems Build and maintain ETL, analytics, and data integration pipelines Ensure secure system design using OAuth2, JWT, and Keycloak Support high availability systems targeting 99.95% uptime Collaborate in an AI...
- ...applications with integrated AI capabilities. This role is ideal for developers who are comfortable working independently while building secure, high-performance applications across both frontend and backend environments. Key Responsibilities Design, develop, and...
- ...junior developers when needed -Collaborate with designers, SEO team, and project managers -Optimize websites for performance, security, and SEO best practices -Troubleshoot, debug, and resolve complex technical issues -Perform code reviews and ensure clean,...
- ...Applicants unable to articulate real exploitation depth will not proceed. Required Experience 5+ years of hands-on offensive security experience Enterprise Red Team or advanced penetration testing background Strong knowledge of: Active Directory attack paths...Remote job
- ...including auditability, traceability, and access logging . Collaborate with solution architects, backend engineers, DevOps, security, and product teams to meet performance and compliance standards. Skills & Requirements ~5+ years of experience in data engineering...Remote job
- ...We are seeking an experienced Data Architect to design, govern, and scale a secure enterprise data platform supporting analytics and AI workloads. The ideal candidate has strong expertise in relational and distributed data systems , with a focus on performance, high...Remote job
- ...Sentrabyte Digital Solusi is a remote-first cybersecurity company specializing in real-world offensive security and adversary simulation. We are hiring a Cyber Security Specialist – Red Team with proven, repeated real-world exploitation experience. This is an execution...Remote job

