WORK WITH US

HOORAY! THERE ARE 3 OPEN POSITION IN OUR COMPANY:
TIME TO START YOUR CAREER!

LEARN MORE

Background

Do you have what it takes?

Being an expert is not easy. We choose only the best of the best, to guarantee the excellence in any of our services.

Please fill in the form and we will be happy to evaluate your skills.
If you’ll be compliant with the requirement, we will get in touch very soon for a Video interview, via our bespoke platform 🙂 and get to know each other a bit better.


See open positions

*
*
*
CAPTCHA
*

Junior Software Developer

We deal with large amount of customized development, unlike other companies that rely on thinking when others print. We design and create our own ideas from a blank piece of paper.

Out developers need to be of a certain caliber, to tackle the onslaught of customer problems.

 

  • A respect for and admiration of the culture, process, and craft of software development.
  • An organized approach to work.
  • Analytical and good at problem solving.
  • Ability to work-to and meet deadlines.
  • Ability to work alone and as a part of a team.
  • Ability to explain complexities in simple language.

check Front-end - HTML, CSS, JavaScript/jQuery.

check Back-end - PHP, Python, Ruby, Java, C#, C++, Perl.

check Databases - MySQL, NoSQL, Oracle.

check Frameworks - NodeJS, Angularjs, React, .NET, Spring, Django

check CMS - WordPress, Joomla, Drupal, Magento, Shopify

check Version Control/Git.


  • Backend Development
  • Frontend Development
  • Documentation

  • Microsoft Infrastructure
  • Linux InfraStructure
  • Mac | Apple Infrastructure
  • Network Engineering
  • Programming
  • Yearn2Learn

Incident Response Analyst

Most of our software is A.I enhanced, some customers prefer a manual approach. Humans can often see what A.I can’t and vice versa so it helps us to have the option of both

check Evaluate new methodologies to support investigating cyber security incidents and provide reviews and recommendations.

check Hunt for threats within the internal and customer networks.

check Learn and keep up with current cyber threats, attack methodology, and detection techniques using a wide variety of security products including COTS and open source.

check Understand and utilize cyber threat intelligence sources.


Data scientist

You’ll extract, analyse and interpret large amounts of data from a range of sources, using algorithmic, data mining, artificial intelligence, machine learning and statistical tools, in order to make it accessible to businesses. Once you’ve interpreted the data you’ll present your results using clear and engaging language.

check test data mining models to select the most appropriate ones for use on a project

check use machine learning tools and statistical techniques to produce solutions to problems

check build algorithms and design experiments to merge, manage, interrogate and extract data.

check assess the effectiveness of data sources and data-gathering techniques and improve data collection methods

check conduct research from which you'll develop prototypes and proof of concepts


  • Mathematics
  • Programming

  • – Email Address Hidden


Products


Company


Contacts

Support