Get new jobs by email
- ...applications, including implementing Retrieval-Augmented Generation (RAG) approaches. Design and optimize data pipelines leveraging vector databases (e.g., Weaviate) to enable semantic search and advanced AI functionality. Qualifications Education...
- ...editing for various formats, ensuring tight pacing, clean transitions, and narrative flow. Motion Graphics : Animate 2D assets and vector files from scratch to create engaging visual sequences. Localization & Adaptation : Work within existing regional project files...
- ...management Good knowledge and understanding of Vulnerability Management and Penetration Testing Knowledge in OWASP and common attack vectors in different platforms (Windows, Linux, Network, etc) Knowledgeable in TCP/IP, Linux/UNIX System Administration, DNS server and...
- ...clearly documented and relayed to the design team for mitigation. The Senior Pen Tester will need to be very versatile in their attack vectors and their knowledge of exploits. The ideal candidate will be well experienced in a broad range of attack vectors across a wide...
- ...Reporting and Documentation: Preparing detailed reports that document the findings, including identified vulnerabilities, attack vectors, and recommendations for remediation. These reports typically outline the risks associated with each vulnerability and provide guidance...
- ...dashboard (Polaris) – client-facing pages for Customers, Subscribe & Save, and Lifetime Value, powered by SQL Server * Set up a vector database and RAG pipeline to unify our unstructured knowledge (SOPs, analysis frameworks, compliance documents, meeting transcripts...
- ...engineering, model optimization) ○ Significant experience with Generative AI technologies (LLMs, prompt engineering, RAG, fine-tuning, vector databases) ○ Hands-on experience building agentic AI systems and multi-agent architectures ○ Strong programming skills in...
- ...travel for client and project engagements. Preferred Qualifications Experience with Generative AI data integration (e.g., vector databases, embeddings). Exposure to multi-country or cross-regional projects. Familiarity with other cloud platforms (Azure,...
- ...enables them to develop effective mitigation strategies. - Hypothesis Driven: Utilizing their expertise and knowledge of attack vectors, they formulate hypotheses about potential threats and then systematically gather and analyze evidence to confirm or refute those hypotheses...
- ...including analyst or engineering roles. v In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors and various types of security controls. v Knowledge of various operating systems including Windows, Linux and Mac. v Working...
- ...chaining, and autonomous agent design. Excellent analytical, problem-solving, and collaboration skills. Preferred Skills Experience with vector search, memory stores, and tool integration for agents. Familiarity with Microsoft Copilot extensibility and plugin development....
- ...models. ~ Solid understanding of large language models (LLMs), including prompt engineering, fine-tuning, embedding generation, and vector search. ~ Expertise in machine learning models such as regression, classification, clustering, ensemble methods, sequence models,...
- ...client-provided or internally produced assets. Sourcing, post-processing, or editing of client-provided or internally produced vector, stock photo, and font assets. Conversion of digital materials to video formats with minimal animation. Optimization and conversion...
- ...Anthropic, and Gemini. You leverage agent frameworks like LangChain, AutoGen, and CrewAI. You build RAG pipelines and work with vector databases. You integrate APIs and design webhooks effectively. You apply advanced prompt engineering techniques. You have...Remote job
- ...systems, not just features Familiarity with automation tools (Zapier, Make, GHL, etc.) Nice-to-Have Experience Vector databases (Pinecone, Weaviate, pgvector) Agent frameworks (LangChain, CrewAI, AutoGen) Data pipelines / ETL workflows...
- ...or chained attack paths Strong understanding of attacker tradecraft, including web, cloud, identity, and infrastructure attack vectors Practical experience with adversary simulation and the MITRE ATT&CK framework Ability to lead, mentor, and influence (this is...
- ...Integrate Legacy & Modern Systems: Bridge modern GenAI components with existing enterprise workflows, ensuring data consistency across vector stores, graph databases, and traditional RDBMS. Technical Leadership & Mentorship: Lead hands-on deep dives and technical...
- ...endpoints and infrastructure Experience with penetration testing and vulnerability assessment tools Understanding of malware, attack vectors, and incident response processes Knowledge of distributed systems and enterprise network environments Experience with...
- ...and optimize end-to-end pipelines for generative AI projects, ensuring seamless data processing and model deployment. • Utilize vector databases, such as Redis, and NoSQL databases to efficiently handle large-scale generative AI datasets and outputs. •...
- ...Semantic Systems Develop advanced search algorithms combining lexical and semantic methodologies Implement RRF techniques and vector-based semantic search using modern embedding techniques Design scalable search architectures for complex query processing...
775000 $ per day
...chaining, and autonomous agent design. Excellent analytical, problem-solving, and collaboration skills. Preferred Skills Experience with vector search, memory stores, and tool integration for agents. Familiarity with Microsoft Copilot extensibility and plugin development....- ...Augmented Generation (RAG) pipelines that pull knowledge from internal SOPs (stored in BookStack) and client data, embedding them into vector databases like Chroma or Pinecone for fast and relevant retrieval Automate critical business actions through smart, multi-step...
- ...Tooling: GitHub Actions, Docker, Terraform (awareness), ADO/Jira, Datadog, Sentry AI (nice‑to‑have): RAG patterns, embeddings, vector DBs (Pinecone/Qdrant), LLM API integration Qualifications Must‑Have (baseline for all levels) Proficiency in TypeScript ,...
- ...Functions as the single point of contact (SPOC) for IT security incidents. Evaluates technical threats, risks, and emerging attack vectors. Supports security incident reporting and escalation processes. Reviews and updates Incident Response Playbooks on a periodic...
70000 - 95000 Php
...familiarity with Node.js, HTML/JS/CSS, React/Next.js (nice to have). OpenAI, LangChain, LangGraph, LangSmith. Flask / FastAPI. Vector DBs (Pinecone, Milvus, etc.). Cloud services (AWS, Azure Service Bus essential). Skills: LLM agent orchestration. RAG /...775000 $ per day
...JSON, YAML, XML, XSLT, REST APIs , Kubernetes , Docker Databases/Search Engine: Elasticsearch/OpenSearch, Azure AI Search, Vector DBs and Graph DBs Security Protocols/Standards: Kerberos, LDAP, OAuth, SSH Cloud Environments: AWS, GCP, Azure LLMs:...- ..., networking devices. • Experience with Pen Tests and Vulnerability Scans. • Understanding of malware, network threats, attack vectors, incident response. • Information security issues in an open, highly distributed networked environment. • Enterprise Intrusion...
1600 - 1920 $
...Implement LLM-based applications (GPT, Claude, open-source models) according to concept specifications. Build RAG systems and vector databases following architecture guidelines. Prepare, clean, and structure data for AI applications. Deploy and configure AI...- ...backend development (Python or Node.js) - Strong experience with JSON, REST, RPC, and XML - Exposure to AI frameworks (embeddings, vector stores, RAG patterns) - Solid knowledge of GCP: Kubernetes/GKE, Vertex AI, BigQuery - Deep understanding of API security,...
- ...knowledge of attacker TTPs mapped to the MITRE ATT&CK framework Understanding of network protocols, traffic analysis, and common attack vectors Familiarity with scripting languages (Python, PowerShell, KQL/SPL) for investigation and automation Experience with case...



