Mission
At DynamoFL, we believe that AI must be developed with privacy, personalization, and real-world constraints in mind. Our engineering culture combines cutting-edge technology with a passionate sense of product ownership. We empower Fortune 500 companies’ adoption of frontier research for their next generation of AI products. Join us if you:
- Continue to stay ahead of competition by creating products that are better, faster, and more beautiful
- Want to push the envelope and work on greenfield technology that advances the state-of-the-art
- Wish to work on a fast-paced team of builders
- Are motivated to work at a rapidly expanding startup and see your impact on end customers in the timeframe of weeks not years.
Responsibilities
- Building and maintaining integrations with cloud services (AWS, Azure), APIs, and security tools to streamline vulnerability management and incident response processes.
- Identifying and prioritizing critical vulnerabilities in software applications, infrastructure, and cloud environments.
- Implementing timely fixes and remediation measures to address identified vulnerabilities and security weaknesses.
- Conducting thorough code reviews and security assessments to ensure compliance with security standards, policies, and regulatory requirements.
- Providing technical guidance and expertise to stakeholders on cloud security best practices, architecture design, and risk mitigation strategies.
- Implementing and maintaining automated testing frameworks, CI/CD pipelines, and security controls to ensure continuous monitoring and enforcement of security policies.
Expectations
- Possess a strong understanding of cloud computing principles and architectures, with hands-on experience in AWS, Azure, or similar cloud platforms.
- Have a proven track record of addressing critical vulnerabilities in production-grade, self-hosted software applications and cloud environments.
- Experience with containerization technologies such as Docker and Kubernetes, including securing containerized applications and orchestrating deployments.
- Familiarity with vulnerability scanning tools, security assessment methodologies, and risk management frameworks.