Diploma network cyber security jobs
...Your Partner in Event Safety and Professional Electrical Operations About Us: AEGCO is a leading company specializing in event safety and electrical operations, with extensive experience in managing safety and compliance for entertainment events. Our core expertise includes electrical safety, civil defense permits, safety certifications, and engineering consultancy reports. Join Our Freelance Network: We are currently seeking highly skilled freelancers in occupational safety and health to collaborate on various projects. If you have the expertise and passion to ensure safety at major events, we want to hear from you. Why Work With AEGCO? • A proven track record in delivering safety solutions for large-scale exhibitions and conferences. • Expertise in floor safety a...
I'm looking for a develope...Right-clicking on a tree object brings up a context menu to draw a simple circular layout network diagram. - When a node of the diagram is clicked, the node's properties are shown in a property table and help information is displayed in a right pane. - The ability to print the diagram from a top menu print tool. - A three-pane layout consisting of a diagram pane, a detail information pane and a help pane. Data and Implementation: - The application will source its JSON feed from local files. - The network diagrams will be simple circular layout diagrams. Ideal candidates should be proficient in Eclipse Theia and have experience working with JSON data and creating interactive applications. A background in creating network diagram ...
I need a seasoned ethical hacker to test the security measures of my Linux server, with a particular focus on database security. Key Requirements: - Extensive experience with ethical hacking and cybersecurity. - Proficient in testing security measures on Linux servers. - Deep understanding of database security protocols and vulnerabilities. Your task will primarily involve: - Identifying potential weaknesses and vulnerabilities within our security infrastructure. - Assessing the effectiveness of our current security measures. - Providing a detailed report of your findings, along with recommendations for improvements. Please provide examples of previous similar projects you've completed. Thank you
... notifications, and trade alerts. Automated trading panel with broker API integration (Zerodha, Upstox, Angel One). Admin Panel: Manage subscriptions, upload research reports, and monitor analytics. Tech Stack: Frontend: React.js or for dynamic and responsive design. Backend: Node.js or Django for API integrations and AI features. Database: PostgreSQL. Hosting: AWS with Cloudflare for security and performance. API Integrations: Stock Market APIs (Alpha Vantage, Yahoo Finance, etc.). Broker APIs (Zerodha Kite Connect, Upstox, Angel Broking). News APIs (, ). AI Tools (TensorFlow, Hugging Face). Workflow Details: AI scanners for live market data analysis and recommendations. Auto-trading with user-approved trade execution via broker APIs. Notifications for trade alerts
Greeting from Freelancer.com One of our client is looking for a Microsoft Sentinel Security Consultant with bilingual proficiency in German and English. The ideal candidate will design, implement, and manage Microsoft Sentinel environments to ensure robust security monitoring and incident response capabilities, strong communication skills in both languages, and the ability to support technical bid preparation for cybersecurity projects. This role requires a combination of technical acumen, bid management experience, and customer-facing skills to help deliver successful proposals and solutions. Key Responsibilities 1. Microsoft Expertise o Design, implement, and optimize Microsoft Sentinel solutions for enterprise clients. o Configure Sentinel data connectors, analytics...
I'm looking for a skilled Laravel developer to help enhance the backend of my application, specifically focusing on user authentication. Key Requirements: - Expertise in Laravel for backend development. - Experience with implementing and improving u... specifically focusing on user authentication. Key Requirements: - Expertise in Laravel for backend development. - Experience with implementing and improving user authentication systems. - Knowledge of various authentication methods (email/password, social media login, etc.), even though the specific methods are not pre-defined for this project. - Ability to provide suggestions for enhancing security and user convenience. Please provide examples of previous backend projects you have worked on, particularly those involving user ...
I am looking for a skilled...integrated, so the developer has the creative freedom to suggest the most suitable ones. A key aspect of this project is the security of the bot. While I have not specified the level of security needed, I expect the developer to understand the importance of safeguarding crypto transactions and user data. A baseline understanding of security measures is essential, but the ability to implement more advanced security features would be a plus. Ideal candidates for this project should have: - Extensive experience in Web3 development - Proficiency in creating Telegram bots - A solid understanding of crypto transactions - Experience with user analytics - Knowledge of security measures in bot development Please submit your proposal...
...create intuitive and impactful applications. Optimize application performance and ensure security and compliance standards are met. Monitor and troubleshoot Kubernetes clusters and deploy applications. Contribute to architectural decisions for AI service integration and application design. Backend: , MongoDB, AWS S3 Frontend: , TypeScript, Yarn Admin Panel: 13, OCR integrations (Python-based) Skills Required is a privacy-first AI chatbot platform leveraging multiple LLMs (Large Language Models) to provide secure and efficient AI-powered solutions for various industries. The platform's modular architecture includes: • Backend: Built using for scalability, security, and performance. • Frontend: Developed with for responsive user interactions
Job Description: Africa Telerad is a growing teleradiology company seeking experienced and licensed radiologists to join our remote team. As part of our network, you will help us manage and deliver high-quality radiology reports to healthcare facilities worldwide. Responsibilities: Interpret and report on diagnostic imaging studies (X-rays, CT scans, MRIs) accurately and promptly. Collaborate with our medical team to ensure timely and quality service delivery. Maintain confidentiality and adhere to all professional standards and HIPAA regulations. Requirements: Valid medical license to practice radiology. Board certification in radiology or equivalent qualifications. Proven experience in teleradiology or remote radiology reporting. Familiarity with PACS and...
...to also assign a new phone -Can accept/process payments -AI agents can Complete surveys -You can use Twilo and other recommended providers to make this happen -Reports for our paying business clients -Outbound campaigns -Inbound campaigns -Encryption (sell this as a secure service and we OWN it vs. white label rental from agencies above) -Global compliance (North America compliance important) -Security certificating -No coding required platform for use of ease -Everything completed in backend without needing to leave app. example. purchasing twilo phone number. I would like to have this built for our company, I am flexible on the technology you integrate, If you have suggestions I want to hear them. Please include your portfolio of similar projects. I am interested in making thi...
I'm seeking a mid-level AWS engineer with a strong focus on S3. I've got a range of tasks that I need assistance with, including data storage and retrieval, managing bucket policy and permissions, as well as data ...hours/week Key Responsibilities: - Assist with data storage and retrieval on S3 - Manage bucket policy and permissions - Oversee data backup and recovery Additionally, it's crucial that this engineer is well-versed in general security best practices, as there will be specific compliance and security requirements for the S3 setup. Ideal Skills: - Proficiency in AWS, particularly S3 - Experience with data storage and retrieval - Knowledge of bucket policy and permissions management - Capable of overseeing data backup and recovery - Well-versed in...
I am seeking a talented freelancer who can help supercharge my Mighty Network dedicated to young professionals thriving in health and wealth. Here’s what I’m looking for: - Technical Assessment: Ensure the network, including the lead magnet (PDF via Kit) and 5-day challenge, is running smoothly. - Marketing Strategy: Develop and manage high-conversion ads with a focus on high ROAS, tailored to my target audience. - Outreach and Engagement: Craft and send direct text messages to my contacts, informing and engaging them about my Mighty Network. - Administrative Support: Handle ongoing admin tasks to maintain the network's efficiency. The perfect candidate will have: - Proven experience with Mighty Networks or similar platforms - Expertise in digital m...
I'm looking for a comprehensive database that can manage client information as well as requests for quotes and confirmed orders and/or projects...order form for jobsite clients to permit invoicing at a laterdate. Ideal Skills and Experience: - Database Development: Proven experience in creating comprehensive databases. - Client Management Systems: Familiarity with client management systems and how they function. - Time Tracking Applications: Experience with developing or integrating time tracking applications. - Data Security: Knowledge of implementing data security measures to protect sensitive client information. This project is ideal for a freelancer who has a solid understanding of client management databases and time tracking applications and can deliver a secure,...
...and ownership upon approval and acceptance. About the Brand – QANTAM The name QANTAM was chosen because it conveys thoughtfulness, innovation, and forward-thinking. It provides a strong foundation for our overarching brand identity and can seamlessly adapt to represent our various services. For example: - QANTAM Security - QANTAM Cleaning - QANTAM Concierge About the Company Our company specialises in integrated services, combining personnel and cloud-based - Security - Concierge - Cleaning (including drone cleaning) - Cloud-Based Services: Building management solutions that are managed in the cloud. Our service model allows clients to access solutions either individually or as part of an integrated package, depending on their needs. We often begin b...
...You can get a feel for our tech-oriented business by visiting our website, www.itit.com. The wrap will cover: - **Sides**: Our company logo and name (ITIT) alongside a tech-themed background. These need to be prominent, catching the attention of passersby. - **Back**: This should detail our company name, website, phone number, and our four main services: Managed IT Services, Cybersecurity, Network Infrastructure, Surveillance Systems, and Structured Cabling. Color-wise, the design should primarily use our company colors, but I am open to creative suggestions that incorporate bright and vibrant colors, as well as a monochromatic scheme. Ideal skills for this project include: - Graphic design - Vehicle wrap design - Understanding of tech-themed aesthetics A portfolio with r...
I'm looking for a software tool that can automate the changing of my MAC address on a Windows machine at regular intervals. The tool can have a graphical user interface (GUI), but it doesn't necessarily need to; either is acceptable. Key requirements: - Proficiency in Windows software development - Experience with network-related software tools - Ability to implement time-based automation features Please provide examples of similar projects you've completed.
Please Sign Up or Login to see details.
...Deactivation of Expired or Invalid Licenses Full Admin access to manage streaming features ------------------------------------------- Features in dashboard for each admin master account Each cms had master admin account for managing everything Dashboard multi level role access Master Admin > Admin > Master Reseller > Reseller > Subreseller Ticket system Firewall Management Whitelisted Management Security Api Database management Live streams management Created channels management Vods management Series management Bouqet Management Group management Transcoding management Ananouncement management Proxy management EPG - Management Manage Categories Live / Radio / Stream Management RTMP Management Subscriptions Management > Mag degvices Management > Userline Man...
Job Description: We are seeking a talented Freelance Go Developer to build a robust application that enables casting content from mobile devices to TVs over a network. The ideal candidate will have a strong understanding of Go programming, networking protocols (especially SSDP), and a passion for creating seamless user experiences. Responsibilities: Develop a Go application to discover TVs on the network using SSDP. Implement a reliable mechanism to stream content (video, audio, images) from mobile devices to discovered TVs. Ensure compatibility across different network environments (e.g., , ). Optimize the application for performance and resource utilization. Maintain code quality and adhere to best practices. Requirements: Solid understanding of networking concep...
...professional to set up the new Microsoft security features for my M365 Business Standard and M365 Personal accounts. The specific requirements include: - Configuring Multi-factor authentication, Data loss prevention, and Conditional access policies - Setting up the Link to Windows or coach me through it. - Correcting the configuration for the M365 Desktop - Cleaning up the RoboForm password manager and ensuring its compatibility with M365 security, In addition to the initial setup, I would like to establish a relationship for ongoing services. This would involve monitoring and maintaining my business accounts, as well as a guest account with Phenom eCloud. Ideal skills and experience for the job include: - Extensive knowledge of Microsoft security features - Pro...
...emergency light colors, and specific workflows. • Multi-tier access control to configure roles and permissions for individual employees. Technical Requirements: • Platform: Linux-based hosting. • Frontend: User-friendly interface with interactive buttons, dropdowns, and real-time validation for mandatory fields. • Backend: Robust database and APIs to ensure scalability and performance. • Security: Role-based access controls, secure user authentication, and data protection mechanisms. Expected Deliverables: • Fully functional ResQMedic system as per the documentation provided. • Responsive design optimized for web-based access. • Comprehensive testing and debugging. • Clear documentation of code and deployment instructions. ...
I'm looking for a skilled developer who can help me integrate an Email and Password login system into my Drupal website, accessible via a React Native application. Key Requirements: - Implement a secure, user-only access system - Use JWT for additional security measures during the login process Ideal Skills: - Extensive experience in React Native and Drupal - Proficient in implementing Email and Password authentication - Skilled in applying JWT for enhanced security measures - Previous experience with user access control systems
...delivering interactive content, quizzes, and step-by-step robot assembly guides. The focus of this project is on establishing the environment and enabling us to populate the content ourselves. Scope of Work: Moodle Installation: Install and configure Moodle on our hosting server (we will provide hosting and domain details). Ensure the installation is optimized for performance, scalability, and security. Theme Customization: Install and configure a professional Moodle theme (suggest options or customize a theme like Edumy, Lambda, or Moove). Customize basic branding elements such as logos, colors, and headers. Course Structure Setup: Create placeholders for courses (one for each level, e.g., Discovery, Explorer, Creator). Configure course categories and sections to allow easy ...
...emergency light colors, and specific workflows. • Multi-tier access control to configure roles and permissions for individual employees. Technical Requirements: • Platform: Linux-based hosting. • Frontend: User-friendly interface with interactive buttons, dropdowns, and real-time validation for mandatory fields. • Backend: Robust database and APIs to ensure scalability and performance. • Security: Role-based access controls, secure user authentication, and data protection mechanisms. Expected Deliverables: • Fully functional ResQMedic system as per the documentation provided. • Responsive design optimized for web-based access. • Comprehensive testing and debugging. • Clear documentation of code and deployment instructions. ...
I'm seeking urgent assistance with my NEBOSH DI3 safety course. I've encountered some difficulties and need someone who is a NEBOSH Diploma-certified professional to help me navigate through this. Key Requirements: - Immediate availability: I need this assistance as soon as possible. - Nebosh Diploma Certification: The ideal candidate should have a Nebosh Diploma certification to ensure that they have the appropriate knowledge and experience to assist with this specific course. Your role: - Help me understand the content of the Nebosh DI3 safety course - Provide guidance and explanations on challenging concepts This is a personal project, so the assistance provided will be beneficial in helping me to successfully complete this course. Your support is great...
...cybersecurity. These attacks are usually carefully planned and financially motivated. Cybercriminals specialize in different types of attacks like phishing, scams, malware, ransomware, and hacking, each using their own methods. To protect against these growing threats, companies need to strengthen their cybersecurity. In June 2017, the Australian Cyber Security Centre (ACSC) introduced the "Essential Eight" strategies to help businesses improve their security. However, companies should not rely only on these strategies and should add extra layers of protection. ### The Essential Eight Techniques The Essential Eight is a set of eight key strategies designed to reduce cybersecurity risks. These strategies focus on preventing, stopping, and recovering from...
...and Login Option to create an account using email and password. Quick access as a guest (no personal data required). Admin Panel Real-time view of the list of online users. Ability to see a preview of active video chats (e.g., camera streams). User management (ban, warnings, etc.). User Interface Simple, intuitive, and responsive design. Seamless experience across desktop and mobile devices. Security and Privacy Secure handling of user data (sessions, logins, etc.). Protection of sensitive user information....
I am looking for a developer to create a crypto gateway server application. The purpose of this application is to convert M0 funds to USDT on the Global Server. Key Requirements: - Experience in cryp...Server. Key Requirements: - Experience in crypto server application development. - Knowledge of currency conversion processes. - Familiarity with global server systems. Ideal Skills: - Proficient in server-side programming languages. - Strong understanding of cryptocurrency and digital funds. - Excellent problem-solving and troubleshooting skills. Please note, the specifics of the platform and security features have not been determined yet. Your input on these aspects will be valuable. Also, the payment methods the server should support for this conversion will need to be discusse...
I'm looking for an innovative engineer or designer to create a unique device. The device should consist of a square made of 4 strips that detects phones (and potentially other electronic devices). If a phone passes over the strip, it should trigger a connected speaker to emit a loud beeping noise. The d...loud beeping noise. - Ensure the device continues to beep as long as the phone is within the square. - Make the device primarily responsive to phones, with the possibility of detecting other electronic devices. Ideal skills and experience include: - Proficiency in engineering or product design. - Experience with electronic device detection technology. - Ability to design a simple yet effective security alert system. - Understanding of sound engineering to create a loud, clear...
I need help finding free offers on CPA NETWORKS. View any of the following sites: www.heyitsfree.net., and one will see multiple free offers. Help is needed to locate the origin of those free offers. I intend to launch a website dedicated to free offers with no ads, no chatting, no capture of email, no blogging: Just free offers. I have secured hosting, along with an URL and am ready to build the site. I seek a consultant who: 1. Has at least two years’ experience working with CPA networks, 2. Knows how to find free offers on CPA Networks. 3. Can display, and teach to me, a proven system for location of free offers on CPA networks: 4. Is willing to work with me at a fixed rate for each offer located. I want to display a total of about thirty free offers, a...
...blockchain networks: Ethereum, Binance Smart Chain, and Polygon. Key requirements: - Multi-network setup: The script should be capable of operating on Ethereum, Binance Smart Chain, and Polygon. - ERC-20 standard: The token should adhere to the ERC-20 standard. - Specific functionalities: The token sales script must incorporate an automatic airdrop mechanism, a referral rewards system, and a vesting schedule. and should be able to use Ideal candidates would have extensive experience with blockchain development, particularly with the ERC-20 standard, and a proven track record of configuring multi-network token sales scripts. Please provide examples of your previous work in your bid.
...registration and profiling - Meeting scheduling and management - Freight forwarding marketplace - Matching algorithm - Payment gateway integration - Rating and review system Requirements: - Front-end development: HTML, CSS, JavaScript, React/Angular - Back-end development: Java/Python/Ruby, Spring/Django - Database management: MySQL/PostgreSQL - API integration: Payment gateways, mapping services - Security and authentication: Encryption, secure authentication, authorization Proposal Request: We would like to request a detailed proposal from your company, including: - Project timeline with milestones and deadlines - Pricing breakdown, including any additional fees - Team composition, including roles and expertise - Communication plan, including regular updates and meetings ...
... is a cutting-edge platform specializing in conversational AI solutions that empower businesses to improve performance, efficiency, and customer satisfaction. Over the past 12 years, we have processed 100 million user requests per year, achieving an 85%+ satisfaction rate. Our unique strengths include: Safe AI: Offering the flexibility to deploy on cloud or on-premise, ensuring data security and compliance with enterprise standards. Regional Languages: Supporting diverse languages and dialects, including Darija, Amazigh, Wolof, Douala, and more, enabling businesses to connect with audiences in culturally relevant ways. AI-Powered Capabilities: Chatbots and Voicebots for enhanced customer engagement. RAG (Retrieval-Augmented Generation) for tailored, context-rich answers directl...
I'm seeking a QA professional with extensive experience in VAPT (Vulnerability Assessment and Penetration Testing) for an ...extensive experience in VAPT (Vulnerability Assessment and Penetration Testing) for an IoT project. This project is hosted on AWS, specifically using AWS IoT Core and Amazon S3. Key Responsibilities: - Evaluate device security, network security, and data security. - Conduct penetration testing, vulnerability assessment, and compliance audit. Ideal Skills and Experience: - Proven expertise in QA for IoT projects. - Strong knowledge of AWS services, particularly AWS IoT Core and Amazon S3. - Proficient in conducting VAPT, with a focus on device, network, and data security. - Experience in performing penetration testing,...
I'm looking for an experienced web developer to create a professional, simple, and responsive B...Site Checkup. This includes: - Proper implementation of meta tags, alt text, schema markup, and XML sitemap. - A mobile-friendly design optimized for Google PageSpeed Insights. Technical Specifications: The website should be built on WordPress, with: - A lightweight and secure platform. - Clean, optimized code for fast loading speeds (homepage load time under 2 seconds). - SSL implementation for security. Content: The homepage should include a clear and engaging introduction to the company. Skills and Experience: - Proven experience in WordPress development. - Strong understanding of B2B website design. - Excellent SEO skills. - Ability to create clean, optimized code for fast ...
I'm seeking a consultant to help get my individual biography published on Wikipedia. I have multiple notable achievements in the field of Business and Entrepreneurship. The consultant should be well-versed with Wikipedia's guidelines for notability and sourcing, and can craft a compelling narrative that aligns with Wikipedia's standards. Ex...seeking a consultant to help get my individual biography published on Wikipedia. I have multiple notable achievements in the field of Business and Entrepreneurship. The consultant should be well-versed with Wikipedia's guidelines for notability and sourcing, and can craft a compelling narrative that aligns with Wikipedia's standards. Experience in Business and Entrepreneurship is a plus, as is a network of contacts with...
I'm facing a configuration error with my AWS EC2 Ubuntu instance. I haven't specified which part of the configuration is causing the issue, but it likely requires expertise in handling AWS EC2 Ubuntu instances. Ideal Skills and Experience: - Extensive experience with AWS EC2 and Ubuntu - Strong troubleshooting and configuration skills - Excellent understanding of network settings, permissions and access, and software installation - Ability to diagnose and resolve issues without detailed prior information
...GDPR and HIPAA, ensuring top-notch security throughout. This includes advanced multi-factor authentication and robust encryption methods. User roles supported by the platform will include: - Administrator: Responsible for course customization and user account management. - Instructor: Overseeing the delivery of course content and student progress. - Student: Engaging with the course material and progressing through the curriculum. Document types that will need to be accessed and tracked are primarily PDFs and Word documents. Ideal skills and experience for this job include: - Proven experience in developing secure web-based platforms. - Familiarity with course management systems is a plus. - Strong knowledge of compliance with industry security standards. ...
Milestones can be discussed after project will be viewed. We are looking for an experienced full-stack developer with solid skills in Python, SQL, Node.js, Vue.js, PHP, and ...Node.js, Vue.js, PHP, and Blade. You should be proficient in both backend and frontend development and write clean, efficient code. Your tasks and skills: • Developing high-performance web applications using Python and SQL. • Building modern frontends with Vue.js and Laravel Blade. • Confident handling of backend technologies like Node.js and PHP. • Experience with APIs, authentication, and security best practices. • Efficient, structured work with a focus on quality and scalability. If you are passionate about working on exciting projects with modern technologies, we look for...
My Samsung device has been showing unexpected pop-ups or ads. I have not installed any new apps recently. I am concerned there may be hidden spyware on the device. I have already run a virus scan, but the issue persists. Ideal skills and experience for the job: - Expertise in mobile device security - Proficient in detecting and removing spyware - Experience with Samsung devices - Knowledge of optimizing device performance post-cleanup.
I'm seeking a proficient QlikSense developer/analyst to craft an extensive article on Qlik Sense Security, specifically focusing on User Access Management. The piece should be technical in tone and style, aimed at an audience well-versed in Qlik Sense. Your responsibilities will include: - Writing about Role-based Access Controls, Section Access, and User Authentication Mechanisms. - Creating step-by-step tutorials within the article. - Following a detailed outline that I will provide. Please note: - A short technical interview will be required to assess your familiarity with Qlik Sense. - The content will be confidential and all copyrights will belong to the project owner. Ideal candidates will have: - A strong understanding of Qlik Sense and its functionalities. - Excellent...
...Deactivation of Expired or Invalid Licenses Full Admin access to manage streaming features ------------------------------------------- Features in dashboard for each admin master account Each cms had master admin account for managing everything Dashboard multi level role access Master Admin > Admin > Master Reseller > Reseller > Subreseller Ticket system Firewall Management Whitelisted Management Security Api Database management Live streams management Created channels management Vods management Series management Bouqet Management Group management Transcoding management Ananouncement management Proxy management EPG - Management Manage Categories Live / Radio / Stream Management RTMP Management Subscriptions Management > Mag degvices Management > Userline Man...
I'm looking for a proof of concept (POC) for a log sharing system. This system needs to sha...logs from an Azure VM to an external destination, specifically Elastic or any other cloud service. The logs are to be stored in a Cloud Blob Storage and monitored via a Log Analytics Workspace. Key Aspects: - Log Types: Only application logs need to be shared. - External Destination: All logs must be sent to Elastic or a similar cloud service. - Compliance: There are no specific compliance or security requirements for this project. Ideal Skills and Experience: - Proficiency in Azure services, particularly VM, Log Analytics Workspace, and Cloud Blob Storage. - Experience in setting up log sharing systems. - Familiarity with Elastic or comparable cloud services. - Ability to create a ...
I need a professional penetration test conducted on two servers (one Windows and one Linux) in order to identify and exploit a minimum of five vulnerabilities on each server. The vulnerabilities can be of any type: - Network vulnerabilities - Application vulnerabilities - System configuration vulnerabilities In addition to the penetration test, I require a comprehensive report detailing the findings, with a maximum word count of 1000. The report should include screenshots and be clear and concise. Ideal candidates for this project should have: - Proven experience in penetration testing of both Windows and Linux servers - Strong understanding of different types of vulnerabilities - Ability to produce a clear and concise report - Skills in taking relevant screenshots during the t...
I'm in need of a seasoned DevOps professional to assist with various tasks on Terraform and Azure during US CST hours. This will be a co...are key. Key Responsibilities: - Infrastructure Provisioning: You will be responsible for creating, monitoring, and scaling our resources. - CI/CD Pipeline Setup: Your expertise will be crucial in establishing and maintaining our CI/CD pipelines. - Security Compliance: Ensuring our systems meet all necessary security standards will be a key part of your role. Ideal Candidate: - Senior level experience in DevOps, specifically with Terraform and Azure. - Proven track record in infrastructure provisioning, CI/CD pipeline setup, and ensuring security compliance. - Excellent communication skills for constant Zoom sessions. - Able...
An architectural proposal is required to remodel a 2-story house, it has a 2-stall garage, 1 roofed terrace and 2 gardens. The project covers the complete remodeling of 260m², from the initial evaluation to the delivery of a design proposal with plans, renders, selection of materials and custom furniture, lighting, security gate for doors and windows and types of windows. I am looking for ideas by recycling, for example, closet doors, dividing doors, room doors, window frames, metal gate, giving it a more modern look. The model and color of the ceiling and wall skirts are also preserved, trying to maximize the limited budget that is available for the project. They must design from 2D plans, photos and videos. I need the following plans: architectural uprising, architectural p...
I'm looking for someone who can provide real-time leads for e-commerce merchants in Europe. - Target Companies: The focus is on large enterprises. - Industries: The leads should primarily belong to the Retail, Tech & Electronics, and Fashion & Apparel sectors. Ideal candidates for this project should have a robust network and experience in lead generation, particularly within the e-commerce space. Familiarity with the specified industries will be an added advantage.
Language Skills IMPORTANT: Bilingual in English and Russian or Ukrainian is preferred. Candidates must reside outside Russia, Belarus, or Ukraine. Job Title: Full-Stack Developer (Symfony, Angular, PHP, MySQL, Go) Jo...communication and collaboration skills. Ability to work independently and within a team in a fast-paced environment. Education: Bachelor's degree in Computer Science, Engineering, or a related field (or equivalent experience). Nice-to-Have Skills: Knowledge of GraphQL or WebSocket-based systems. Familiarity with cloud platforms (e.g., AWS, GCP, Azure). Experience in DevOps or CI/CD pipelines. Knowledge of security best practices for both frontend and backend development. To ensure your application is considered, include the phrase “Building the Future&rdqu...