You will be responsible for leading software development efforts from a technology perspective. This includes active involvement in all technical activities within the team, such as software development life cycle activities, code reviews, and research. You will identify the appropriate software architecture based on the requirements and design elements, while maintaining, reviewing, and evolving software architecture documents in alignment with system requirements and industry trends. Additionally, you will provide work leadership, training, and technical guidance to Software Engineers, taking ownership of the system design, coding, peer review, and test automation. As a Rust Programmer, you will actively participate in team meetings as part of Agile/Scrum sprint-based execution. To excel in this role, you should be accustomed to handling multiple responsibilities, highly motivated, quality-conscious with keen attention to detail, and possess a track record of accomplishments throughout your career. Ideally, you should hold a Bachelor's Degree with at least 7 years of relevant experience, a Master's Degree with a similar level of experience, or an equivalent qualification. You must be an expert in high-level programming languages such as Rust, C++, or Go. A minimum of 5 years of experience in Rust-based development is required, along with a working knowledge of AWS, Azure, GCP, or equivalent cloud platforms. Strong analytical and troubleshooting skills are essential for success in this role.,
Role Overview: As a Cyber Security Specialist, you will be responsible for conducting penetration testing, vulnerability assessments, security audits, incident response, and monitoring network traffic for suspicious activities. Additionally, you need to stay updated on the latest security threats and collaborate with internal teams to enforce security best practices. Key Responsibilities: - Conduct comprehensive penetration testing and vulnerability assessments using tools like Metasploit, Nessus, Burp Suite, and Nmap. - Perform regular security audits, analyze findings, and provide recommendations for remediation. - Assist in identifying, analyzing, and responding to security incidents such as breaches and malware infections. - Monitor network traffic and logs for suspicious activities using IDS/IPS, SIEM tools, and other monitoring software. - Identify, assess, and mitigate vulnerabilities within internal and external IT environments. - Stay informed about the latest security threats and collaborate with external threat intelligence platforms. - Develop and enforce security policies, procedures, and best practices across the organization. - Work closely with internal teams to integrate security measures and provide reports to stakeholders. - Conduct security awareness training sessions for employees and ensure compliance with regulatory standards. - Configure, manage, and enhance cyber security tools, and automate tasks to improve efficiency. Qualifications Required: - Certified Ethical Hacker (CEH) certification or equivalent security certifications like CISSP, OSCP. - Strong knowledge of networking protocols and network security. - Experience in penetration testing, security assessments, and vulnerability management. - Proficiency with tools such as Kali Linux, Metasploit, Burp Suite, Nessus, Wireshark, and Nmap. - Hands-on experience with firewall management, IDS/IPS systems, and SIEM tools. - Understanding of operating systems security, web applications, and incident response protocols. - Familiarity with regulatory requirements, cloud security, and strong troubleshooting skills. - Excellent communication and interpersonal skills for effective collaboration with cross-functional teams.,