←back to thread

380 points whoishiring | 1 comments | | HN request time: 0.244s | source

Please state the job location and include the keywords REMOTE, INTERNS and/or VISA when the corresponding sort of candidate is welcome. When remote work is not an option, include ONSITE.

Please only post if you personally are part of the hiring company—no recruiting firms or job boards. Only one post per company. If it isn't a household name, explain what your company does.

Commenters: please don't reply to job posts to complain about something. It's off topic here.

Readers: please only email if you are personally interested in the job.

Searchers: Try https://findwork.dev/?source=hn, https://kennytilton.github.io/whoishiring/, https://hnhired.com/, https://hnjobs.emilburzo.com, https://news.ycombinator.com/item?id=10313519.

Don't miss these other fine threads:

Who wants to be hired? https://news.ycombinator.com/item?id=21126012

Freelancer? Seeking freelancer? https://news.ycombinator.com/item?id=21126013

1. 0xsra0x ◴[] No.21129218[source]
Security Risk Advisors | DevOps Engineer | (REMOTE, USA) | Full Time We're hiring a DevOps Engineer! We’re rapidly improving our primary application VECTR (http://vectr.io/) with state-of-the-art enterprise software features. We’re looking for new team members to help us grow VECTR and build additional information security tools. This is an outstanding opportunity to work in a growing niche and interact with well-known client organizations. Responsibilities include installation and maintenance of VECTR (Dockerized Java/Tomcat, AngularJS, and MongoDB stack) deployed in cloud environments (AWS, Azure) and on client servers. DevSecOps Client Assessments: app development standards, secure SDLC evaluation, and product selection, etc. Check it out: https://securityriskadvisors.workable.com/j/249133CB34?viewe...

Security Risk Advisors | Red Team Operator | (Philadelphia, PA) | Full Time Become a part of our Red Team! We're looking for people to help improve our capabilities in performing stealthy, highly targeted attacks against our clients. We want someone who doesn't blanch when it comes to using certutil to reconstruct a base64 encoded payload on a Windows server because the upload capacity was too limited to upload the full payload. Someone who is willing to write a perl script to forward ports on a GNU/Linux server to pivot into a privileged network. If that and writing custom web-shells and creating custom attacks for specific client profiles interest you, this is the role for you. https://securityriskadvisors.workable.com/jobs/1019623