Security risk assessment jobs
As a press reporter, public group moderator, and volunteer based out of Bhopal, I'm looking for a cyber security expert who can help me with incident response related to cyber banking fraud. Key Responsibilities: - Assess and respond to incidents related to cyber banking fraud - Provide proactive measures to prevent such incidents - Help in understanding and interpreting these incidents for a journalistic perspective Ideal Candidate: - Extensive experience in cyber security, particularly in incident response - Prior experience dealing with cyber banking fraud - Ability to communicate complex cyber incidents in a simple manner - A knack for journalism would be a plus
...and specialized mobile app developer to complete our augmented reality (AR) app. The app already has most of its features implemented, and we need an expert to fine-tune the location management using GPS, enhance security, and eventually create an iOS version of the app based on the Android build. Key Responsibilities: - Location Management Fixes: The app currently integrates GPS tracking, but we need your expertise to ensure the GPS-based location management is robust, accurate, and optimized for performance across different devices. - App Security: Implement additional security measures to ensure the app is secure, especially in handling user data and any sensitive information. - Android Completion: Complete any remaining work on the Android version of the app...
Presenter / Actor for Product Review Male, 45+ Native English speaking Friendly appearance I'm looking for an actor, to review a back pain-solving stretching tool. The review should focus on how well the tool reduces pain in the lower back, as well as its overall eff...should focus on how well the tool reduces pain in the lower back, as well as its overall effectiveness and usability. You must film yourself using and talking about the product. Ideal Skills: - Acting: The reviewer should be able to present the review in an engaging and convincing manner. - Product Testing: The reviewer should be able to demonstrate the product and provide a detailed assessment of its performance. - Communication: The reviewer should be able to articulate their thoughts clearly an...
...information: Name, description, start and end dates, assigned team, status. Edit project details inline. Milestones tracking and deadline management. 3. Task Management Create, assign, and update tasks. Task views: List View Kanban Board Gantt Chart Task filters (by status, priority, due date). Subtasks and recurring tasks support. 4. Risk and Budget Management Risk matrix (impact vs. probability). Mitigation plans and conditional formatting for high-risk items. Budget tracking: Total budget, expenses, and remaining funds. Visualizations for expenses and trends (charts). 5. Reporting and Analytics Real-time charts for: Task completion rates. Project delays. Resource utilization. Export options for reports (PDF, Excel, Word). Embedded Power BI dashboards. 6. Auto...
I need a seasoned ethical hacker to test the security measures of my Linux server, with a particular focus on database security. Key Requirements: - Extensive experience with ethical hacking and cybersecurity. - Proficient in testing security measures on Linux servers. - Deep understanding of database security protocols and vulnerabilities. Your task will primarily involve: - Identifying potential weaknesses and vulnerabilities within our security infrastructure. - Assessing the effectiveness of our current security measures. - Providing a detailed report of your findings, along with recommendations for improvements. Please provide examples of previous similar projects you've completed. Thank you
...tools, educational resources, and market insights to retail investors, traders, and learners. Key Requirements: Compliance: Adhere to all SEBI regulations, including proper disclaimers, risk disclosures, and secure data storage. Features: Public Pages: Home Page (with SEBI registration details, key services, and CTAs). About Us (mission, vision, SEBI certificate display). Services (Research, AI Scanners, Auto-Trading, and Education Hub). Pricing Plans (Free & Paid Plans with Razorpay/Stripe integration). Blog/News Section (integrated with News APIs). Contact Us (query form and contact info). Compliance Page (risk warnings and disclaimers). Client Dashboard: Portfolio tracking, AI signals, notifications, and trade alerts. Automated trading panel with broker API integra...
Greeting from Freelancer.com One of our client is looking for a Microsoft Sentinel Security Consultant with bilingual proficiency in German and English. The ideal candidate will design, implement, and manage Microsoft Sentinel environments to ensure robust security monitoring and incident response capabilities, strong communication skills in both languages, and the ability to support technical bid preparation for cybersecurity projects. This role requires a combination of technical acumen, bid management experience, and customer-facing skills to help deliver successful proposals and solutions. Key Responsibilities 1. Microsoft Expertise o Design, implement, and optimize Microsoft Sentinel solutions for enterprise clients. o Configure Sentinel data connectors, analytics...
I am preparing for the PMP exam and need help specifically with Project Management Processes, Agile Project Management, and Risk and Procurement. Key Requirements: - Assistance primarily with multiple choice practice exams - Expertise in the PMP exam content and format - Ability to provide comprehensive feedback and strategies for improvement Ideal Skills and Experience: - Proven track record of helping students clear the PMP exam - Access to an extensive bank of quality practice exams - Excellent communication and teaching skills
I'm looking for a skilled Laravel developer to help enhance the backend of my application, specifically focusing on user authentication. Key Requirements: - Expertise in Laravel for backend development. - Experience with implementing and improving u... specifically focusing on user authentication. Key Requirements: - Expertise in Laravel for backend development. - Experience with implementing and improving user authentication systems. - Knowledge of various authentication methods (email/password, social media login, etc.), even though the specific methods are not pre-defined for this project. - Ability to provide suggestions for enhancing security and user convenience. Please provide examples of previous backend projects you have worked on, particularly those involving user ...
I am looking for a skilled...integrated, so the developer has the creative freedom to suggest the most suitable ones. A key aspect of this project is the security of the bot. While I have not specified the level of security needed, I expect the developer to understand the importance of safeguarding crypto transactions and user data. A baseline understanding of security measures is essential, but the ability to implement more advanced security features would be a plus. Ideal candidates for this project should have: - Extensive experience in Web3 development - Proficiency in creating Telegram bots - A solid understanding of crypto transactions - Experience with user analytics - Knowledge of security measures in bot development Please submit your proposal...
...create intuitive and impactful applications. Optimize application performance and ensure security and compliance standards are met. Monitor and troubleshoot Kubernetes clusters and deploy applications. Contribute to architectural decisions for AI service integration and application design. Backend: , MongoDB, AWS S3 Frontend: , TypeScript, Yarn Admin Panel: 13, OCR integrations (Python-based) Skills Required is a privacy-first AI chatbot platform leveraging multiple LLMs (Large Language Models) to provide secure and efficient AI-powered solutions for various industries. The platform's modular architecture includes: • Backend: Built using for scalability, security, and performance. • Frontend: Developed with for responsive user interactions
...to also assign a new phone -Can accept/process payments -AI agents can Complete surveys -You can use Twilo and other recommended providers to make this happen -Reports for our paying business clients -Outbound campaigns -Inbound campaigns -Encryption (sell this as a secure service and we OWN it vs. white label rental from agencies above) -Global compliance (North America compliance important) -Security certificating -No coding required platform for use of ease -Everything completed in backend without needing to leave app. example. purchasing twilo phone number. I would like to have this built for our company, I am flexible on the technology you integrate, If you have suggestions I want to hear them. Please include your portfolio of similar projects. I am interested in making thi...
I'm seeking a mid-level AWS engineer with a strong focus on S3. I've got a range of tasks that I need assistance with, including data storage and retrieval, managing bucket policy and permissions, as well as data ...hours/week Key Responsibilities: - Assist with data storage and retrieval on S3 - Manage bucket policy and permissions - Oversee data backup and recovery Additionally, it's crucial that this engineer is well-versed in general security best practices, as there will be specific compliance and security requirements for the S3 setup. Ideal Skills: - Proficiency in AWS, particularly S3 - Experience with data storage and retrieval - Knowledge of bucket policy and permissions management - Capable of overseeing data backup and recovery - Well-versed in...
I am seeking a talented freelancer who can help supercharge my Mighty Network dedicated to young professionals thriving in health and wealth. Here’s what I’m looking for: - Technical Assessment: Ensure the network, including the lead magnet (PDF via Kit) and 5-day challenge, is running smoothly. - Marketing Strategy: Develop and manage high-conversion ads with a focus on high ROAS, tailored to my target audience. - Outreach and Engagement: Craft and send direct text messages to my contacts, informing and engaging them about my Mighty Network. - Administrative Support: Handle ongoing admin tasks to maintain the network's efficiency. The perfect candidate will have: - Proven experience with Mighty Networks or similar platforms - Expertise in digital marketing, espe...
I'm looking for a comprehensive database that can manage client information as well as requests for quotes and confirmed orders and/or projects...order form for jobsite clients to permit invoicing at a laterdate. Ideal Skills and Experience: - Database Development: Proven experience in creating comprehensive databases. - Client Management Systems: Familiarity with client management systems and how they function. - Time Tracking Applications: Experience with developing or integrating time tracking applications. - Data Security: Knowledge of implementing data security measures to protect sensitive client information. This project is ideal for a freelancer who has a solid understanding of client management databases and time tracking applications and can deliver a secure,...
...and ownership upon approval and acceptance. About the Brand – QANTAM The name QANTAM was chosen because it conveys thoughtfulness, innovation, and forward-thinking. It provides a strong foundation for our overarching brand identity and can seamlessly adapt to represent our various services. For example: - QANTAM Security - QANTAM Cleaning - QANTAM Concierge About the Company Our company specialises in integrated services, combining personnel and cloud-based - Security - Concierge - Cleaning (including drone cleaning) - Cloud-Based Services: Building management solutions that are managed in the cloud. Our service model allows clients to access solutions either individually or as part of an integrated package, depending on their needs. We often begin b...
Please Sign Up or Login to see details.
...Deactivation of Expired or Invalid Licenses Full Admin access to manage streaming features ------------------------------------------- Features in dashboard for each admin master account Each cms had master admin account for managing everything Dashboard multi level role access Master Admin > Admin > Master Reseller > Reseller > Subreseller Ticket system Firewall Management Whitelisted Management Security Api Database management Live streams management Created channels management Vods management Series management Bouqet Management Group management Transcoding management Ananouncement management Proxy management EPG - Management Manage Categories Live / Radio / Stream Management RTMP Management Subscriptions Management > Mag degvices Management > Userline Man...
...professional to set up the new Microsoft security features for my M365 Business Standard and M365 Personal accounts. The specific requirements include: - Configuring Multi-factor authentication, Data loss prevention, and Conditional access policies - Setting up the Link to Windows or coach me through it. - Correcting the configuration for the M365 Desktop - Cleaning up the RoboForm password manager and ensuring its compatibility with M365 security, In addition to the initial setup, I would like to establish a relationship for ongoing services. This would involve monitoring and maintaining my business accounts, as well as a guest account with Phenom eCloud. Ideal skills and experience for the job include: - Extensive knowledge of Microsoft security features - Pro...
...emergency light colors, and specific workflows. • Multi-tier access control to configure roles and permissions for individual employees. Technical Requirements: • Platform: Linux-based hosting. • Frontend: User-friendly interface with interactive buttons, dropdowns, and real-time validation for mandatory fields. • Backend: Robust database and APIs to ensure scalability and performance. • Security: Role-based access controls, secure user authentication, and data protection mechanisms. Expected Deliverables: • Fully functional ResQMedic system as per the documentation provided. • Responsive design optimized for web-based access. • Comprehensive testing and debugging. • Clear documentation of code and deployment instructions. ...
I'm looking for a skilled developer who can help me integrate an Email and Password login system into my Drupal website, accessible via a React Native application. Key Requirements: - Implement a secure, user-only access system - Use JWT for additional security measures during the login process Ideal Skills: - Extensive experience in React Native and Drupal - Proficient in implementing Email and Password authentication - Skilled in applying JWT for enhanced security measures - Previous experience with user access control systems
...delivering interactive content, quizzes, and step-by-step robot assembly guides. The focus of this project is on establishing the environment and enabling us to populate the content ourselves. Scope of Work: Moodle Installation: Install and configure Moodle on our hosting server (we will provide hosting and domain details). Ensure the installation is optimized for performance, scalability, and security. Theme Customization: Install and configure a professional Moodle theme (suggest options or customize a theme like Edumy, Lambda, or Moove). Customize basic branding elements such as logos, colors, and headers. Course Structure Setup: Create placeholders for courses (one for each level, e.g., Discovery, Explorer, Creator). Configure course categories and sections to allow easy ...
I need a structural investigation conducted on a 25x42 hay shed. The county requires a note indicating that the structure has been assessed for permitting. Key requirements: - Comprehensive assessment of the shed's structural stability and safety. - Evaluation of the shed's compliance with zoning regulations. - Inclusion of any other pertinent information necessary for the structure to be permitted. Ideal freelancer: - Should have experience in structural engineering. - Should be familiar with local zoning regulations. - Should be able to provide a professional and comprehensive report for county permitting.
...emergency light colors, and specific workflows. • Multi-tier access control to configure roles and permissions for individual employees. Technical Requirements: • Platform: Linux-based hosting. • Frontend: User-friendly interface with interactive buttons, dropdowns, and real-time validation for mandatory fields. • Backend: Robust database and APIs to ensure scalability and performance. • Security: Role-based access controls, secure user authentication, and data protection mechanisms. Expected Deliverables: • Fully functional ResQMedic system as per the documentation provided. • Responsive design optimized for web-based access. • Comprehensive testing and debugging. • Clear documentation of code and deployment instructions. ...
...in-depth research, and providing actionable insights to help drive strategic investment decisions. Key Responsibilities: • Deal Sourcing: Research and identify online businesses, content websites, SaaS companies, social media accounts, and mobile apps that align with our acquisition criteria. • Data Capture: Capture and save key information about each target company into our database. • Financial Assessment: Conduct financial modeling, evaluate revenue streams, and assess growth potential for potential acquisitions. • Due Diligence: Collaborate with the team to conduct due diligence, reviewing key metrics, customer data, and operational details of target companies. • Collaboration: Work closely with the leadership team to refine acquisition strategies ...
...cybersecurity. These attacks are usually carefully planned and financially motivated. Cybercriminals specialize in different types of attacks like phishing, scams, malware, ransomware, and hacking, each using their own methods. To protect against these growing threats, companies need to strengthen their cybersecurity. In June 2017, the Australian Cyber Security Centre (ACSC) introduced the "Essential Eight" strategies to help businesses improve their security. However, companies should not rely only on these strategies and should add extra layers of protection. ### The Essential Eight Techniques The Essential Eight is a set of eight key strategies designed to reduce cybersecurity risks. These strategies focus on preventing, stopping, and recovering from attack...
I need a detailed engineers report for a structural engineering assessment of a residential building. The report should include plans and specifications suitable for submission to the local council. Key Aspects: - Focus primarily on the evaluation of framing and load-bearing structures. - Include comprehensive designs and specifications for the foundation and roof. Ideal Skills: - Extensive experience in structural engineering, particularly with residential buildings. - Proven track record of creating council-ready engineering reports. - Proficiency in designing framing and load-bearing structures. - Skills in foundation and roof design.
...and Login Option to create an account using email and password. Quick access as a guest (no personal data required). Admin Panel Real-time view of the list of online users. Ability to see a preview of active video chats (e.g., camera streams). User management (ban, warnings, etc.). User Interface Simple, intuitive, and responsive design. Seamless experience across desktop and mobile devices. Security and Privacy Secure handling of user data (sessions, logins, etc.). Protection of sensitive user information....
I am looking for a developer to create a crypto gateway server application. The purpose of this application is to convert M0 funds to USDT on the Global Server. Key Requirements: - Experience in cryp...Server. Key Requirements: - Experience in crypto server application development. - Knowledge of currency conversion processes. - Familiarity with global server systems. Ideal Skills: - Proficient in server-side programming languages. - Strong understanding of cryptocurrency and digital funds. - Excellent problem-solving and troubleshooting skills. Please note, the specifics of the platform and security features have not been determined yet. Your input on these aspects will be valuable. Also, the payment methods the server should support for this conversion will need to be discusse...
I'm looking for an innovative engineer or designer to create a unique device. The device should consist of a square made of 4 strips that detects phones (and potentially other electronic devices). If a phone passes over the strip, it should trigger a connected speaker to emit a loud beeping noise. The d...loud beeping noise. - Ensure the device continues to beep as long as the phone is within the square. - Make the device primarily responsive to phones, with the possibility of detecting other electronic devices. Ideal skills and experience include: - Proficiency in engineering or product design. - Experience with electronic device detection technology. - Ability to design a simple yet effective security alert system. - Understanding of sound engineering to create a loud, clear...
...collaboration with stakeholders. Develop detailed project plans, schedules, and workflows. Ensure all projects adhere to set objectives, quality standards, and budget constraints. Team Coordination Collaborate with cross-functional teams, contractors, and stakeholders. Assign tasks and track team progress to ensure milestones are met. Facilitate regular project meetings and provide updates on progress. Risk Management Identify potential project risks and develop mitigation plans. Troubleshoot and resolve issues to maintain project momentum. Communication and Reporting Act as the main point of contact for clients and stakeholders. Provide regular status updates and project reports. Manage client expectations and ensure satisfaction throughout the project lifecycle. Budget and Reso...
...registration and profiling - Meeting scheduling and management - Freight forwarding marketplace - Matching algorithm - Payment gateway integration - Rating and review system Requirements: - Front-end development: HTML, CSS, JavaScript, React/Angular - Back-end development: Java/Python/Ruby, Spring/Django - Database management: MySQL/PostgreSQL - API integration: Payment gateways, mapping services - Security and authentication: Encryption, secure authentication, authorization Proposal Request: We would like to request a detailed proposal from your company, including: - Project timeline with milestones and deadlines - Pricing breakdown, including any additional fees - Team composition, including roles and expertise - Communication plan, including regular updates and meetings ...
... is a cutting-edge platform specializing in conversational AI solutions that empower businesses to improve performance, efficiency, and customer satisfaction. Over the past 12 years, we have processed 100 million user requests per year, achieving an 85%+ satisfaction rate. Our unique strengths include: Safe AI: Offering the flexibility to deploy on cloud or on-premise, ensuring data security and compliance with enterprise standards. Regional Languages: Supporting diverse languages and dialects, including Darija, Amazigh, Wolof, Douala, and more, enabling businesses to connect with audiences in culturally relevant ways. AI-Powered Capabilities: Chatbots and Voicebots for enhanced customer engagement. RAG (Retrieval-Augmented Generation) for tailored, context-rich answers directl...
I'm seeking a QA professional with extensive experience in VAPT (Vulnerability Assessment and Penetration Testing) for an IoT project. This project is hosted on AWS, specifically using AWS IoT Core and Amazon S3. Key Responsibilities: - Evaluate device security, network security, and data security. - Conduct penetration testing, vulnerability assessment, and compliance audit. Ideal Skills and Experience: - Proven expertise in QA for IoT projects. - Strong knowledge of AWS services, particularly AWS IoT Core and Amazon S3. - Proficient in conducting VAPT, with a focus on device, network, and data security. - Experience in performing penetration testing, vulnerability assessments, and compliance audits.
I'm looking for an experienced web developer to create a professional, simple, and responsive B...Site Checkup. This includes: - Proper implementation of meta tags, alt text, schema markup, and XML sitemap. - A mobile-friendly design optimized for Google PageSpeed Insights. Technical Specifications: The website should be built on WordPress, with: - A lightweight and secure platform. - Clean, optimized code for fast loading speeds (homepage load time under 2 seconds). - SSL implementation for security. Content: The homepage should include a clear and engaging introduction to the company. Skills and Experience: - Proven experience in WordPress development. - Strong understanding of B2B website design. - Excellent SEO skills. - Ability to create clean, optimized code for fast ...
...GDPR and HIPAA, ensuring top-notch security throughout. This includes advanced multi-factor authentication and robust encryption methods. User roles supported by the platform will include: - Administrator: Responsible for course customization and user account management. - Instructor: Overseeing the delivery of course content and student progress. - Student: Engaging with the course material and progressing through the curriculum. Document types that will need to be accessed and tracked are primarily PDFs and Word documents. Ideal skills and experience for this job include: - Proven experience in developing secure web-based platforms. - Familiarity with course management systems is a plus. - Strong knowledge of compliance with industry security standards. ...
Milestones can be discussed after project will be viewed. We are looking for an experienced full-stack developer with solid skills in Python, SQL, Node.js, Vue.js, PHP, and ...Node.js, Vue.js, PHP, and Blade. You should be proficient in both backend and frontend development and write clean, efficient code. Your tasks and skills: • Developing high-performance web applications using Python and SQL. • Building modern frontends with Vue.js and Laravel Blade. • Confident handling of backend technologies like Node.js and PHP. • Experience with APIs, authentication, and security best practices. • Efficient, structured work with a focus on quality and scalability. If you are passionate about working on exciting projects with modern technologies, we look for...
My Samsung device has been showing unexpected pop-ups or ads. I have not installed any new apps recently. I am concerned there may be hidden spyware on the device. I have already run a virus scan, but the issue persists. Ideal skills and experience for the job: - Expertise in mobile device security - Proficient in detecting and removing spyware - Experience with Samsung devices - Knowledge of optimizing device performance post-cleanup.
I'm seeking a proficient QlikSense developer/analyst to craft an extensive article on Qlik Sense Security, specifically focusing on User Access Management. The piece should be technical in tone and style, aimed at an audience well-versed in Qlik Sense. Your responsibilities will include: - Writing about Role-based Access Controls, Section Access, and User Authentication Mechanisms. - Creating step-by-step tutorials within the article. - Following a detailed outline that I will provide. Please note: - A short technical interview will be required to assess your familiarity with Qlik Sense. - The content will be confidential and all copyrights will belong to the project owner. Ideal candidates will have: - A strong understanding of Qlik Sense and its functionalities. - Excellent...
...Deactivation of Expired or Invalid Licenses Full Admin access to manage streaming features ------------------------------------------- Features in dashboard for each admin master account Each cms had master admin account for managing everything Dashboard multi level role access Master Admin > Admin > Master Reseller > Reseller > Subreseller Ticket system Firewall Management Whitelisted Management Security Api Database management Live streams management Created channels management Vods management Series management Bouqet Management Group management Transcoding management Ananouncement management Proxy management EPG - Management Manage Categories Live / Radio / Stream Management RTMP Management Subscriptions Management > Mag degvices Management > Userline Man...
I'm looking for a proof of concept (POC) for a log sharing system. This system needs to sha...logs from an Azure VM to an external destination, specifically Elastic or any other cloud service. The logs are to be stored in a Cloud Blob Storage and monitored via a Log Analytics Workspace. Key Aspects: - Log Types: Only application logs need to be shared. - External Destination: All logs must be sent to Elastic or a similar cloud service. - Compliance: There are no specific compliance or security requirements for this project. Ideal Skills and Experience: - Proficiency in Azure services, particularly VM, Log Analytics Workspace, and Cloud Blob Storage. - Experience in setting up log sharing systems. - Familiarity with Elastic or comparable cloud services. - Ability to create a ...
...requirements. Platform Focus: 1. Platform 1 (Loans, Credit Cards, Insurance, Taxation, Bank Investments): Identify and secure collaborations for loan and credit card aggregators, insurance providers, and tax platforms. Help establish partnerships for banking product data and financial services. 2. Platform 2 (Stock Market Basics, Trading Strategies, Risk Management): Identify and negotiate with stock market data providers, educational resources, and risk management tools. Find opportunities for brokerage partnerships or data integrations for trading tools. 3. Platform 3 (Mutual Funds, SIP, Portfolio Management, Tax-Saving Investments): Research and negotiate with mutual fund data providers, SIP calculators, and portfolio management services. Establish partnerships with...
I'm in need of a seasoned DevOps professional to assist with various tasks on Terraform and Azure during US CST hours. This will be a co...are key. Key Responsibilities: - Infrastructure Provisioning: You will be responsible for creating, monitoring, and scaling our resources. - CI/CD Pipeline Setup: Your expertise will be crucial in establishing and maintaining our CI/CD pipelines. - Security Compliance: Ensuring our systems meet all necessary security standards will be a key part of your role. Ideal Candidate: - Senior level experience in DevOps, specifically with Terraform and Azure. - Proven track record in infrastructure provisioning, CI/CD pipeline setup, and ensuring security compliance. - Excellent communication skills for constant Zoom sessions. - Able...
An architectural proposal is required to remodel a 2-story house, it has a 2-stall garage, 1 roofed terrace and 2 gardens. The project covers the complete remodeling of 260m², from the initial evaluation to the delivery of a design proposal with plans, renders, selection of materials and custom furniture, lighting, security gate for doors and windows and types of windows. I am looking for ideas by recycling, for example, closet doors, dividing doors, room doors, window frames, metal gate, giving it a more modern look. The model and color of the ceiling and wall skirts are also preserved, trying to maximize the limited budget that is available for the project. They must design from 2D plans, photos and videos. I need the following plans: architectural uprising, architectural p...
Language Skills IMPORTANT: Bilingual in English and Russian or Ukrainian is preferred. Candidates must reside outside Russia, Belarus, or Ukraine. Job Title: Full-Stack Developer (Symfony, Angular, PHP, MySQL, Go) Jo...communication and collaboration skills. Ability to work independently and within a team in a fast-paced environment. Education: Bachelor's degree in Computer Science, Engineering, or a related field (or equivalent experience). Nice-to-Have Skills: Knowledge of GraphQL or WebSocket-based systems. Familiarity with cloud platforms (e.g., AWS, GCP, Azure). Experience in DevOps or CI/CD pipelines. Knowledge of security best practices for both frontend and backend development. To ensure your application is considered, include the phrase “Building the Future&rdqu...
I'm experiencing issues with a script I have for crawling and analyzing Git...Selenium or other web scraping tools. The script is designed to: Automate Code Analysis: Analyze a GitHub repository's codebase without manual intervention. Generate Evaluation Metrics: Use AI to generate meaningful evaluation criteria for code quality, functionality, or other metrics. Assess Code Quality: Provide a basic assessment of the codebase based on the generated criteria. Save Results for Further Use: Store the extracted codebase, evaluation criteria, and assessment results in a structured format (JSON) for further analysis or reporting. please provide details of how you are going to solve the problem and the final data format. Please go through my documents and make your pr...
...compliance reports. - The platform should incorporate assessments of compliance to generate insights on governance, transparency, and public perception. - Integration with automation tools: The ideal candidate should be capable of integrating the platform with automation, data visualization, machine learning tools. - A polished corporate UI used by clients to generate reports, insights, real time assessment / dashboards Ideal candidate should have: - Proven experience in AI and data analysis - Strong understanding of Financial, Belief based industries - Skills in using automation tools and data visualization software - Ability to create a scalable and user-friendly platform. Please only apply if you have extensive (min 10years) news, social media, rules based AI &am...