Remote Malware + Python Jobs in Oct 2020 Open Startup
Remote HealthPost a job

find a remote job
work from anywhere

Browse 1 Remote Malware Python Job in October 2020 at Polyswarm working as a Full-Stack Developer. Last post

Browse 1 Remote Malware Python Job in October 2020 at Polyswarm working as a Full-Stack Developer. Last post

Remote HealthPost a job

Get a  email of all new remote Malware + Python + jobs




👉 Hiring for a remote Malware + Python position?

Post a job
on the 🏆 #1 remote jobs board

Previous remote Malware + Python jobs

The first health insurance for remote startups
A fully equipped health insurance that works for all your global employees
The first health insurance for remote startups
A fully equipped health insurance that works for all your global employees
This job post is closed and the position is probably filled. Please do not apply.
***In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.***\n\n\n**Job type:** Full-time \n**Role:** Full-Stack Developer \n**Experience level:** Mid-Level, Senior\n**Industry:** Cryptocurrency, Cybersecurity, Network Security, Blockchain \n**Company size:** 11-50 people\n**Location:** San Diego, CA, San Juan, Puerto Rico, Tokyo, Japan or **Remote**\n\n\n**Join the Swarm**\n\nAt Swarm Technologies, Inc, we're developing innovative solutions to age-old information security problems - and we need your help.\n\nAt its core, PolySwarm is market design enabled by Ethereum smart contracts. We are programming a market that will produce crowdsourced threat intelligence (malware detection today, more tomorrow).\n\n** Blockchain experience not required! **\n\nWe're operating in a very new industry and we're prepared to bring candidates up to speed! Few sectors are hot as blockchain right now - talk about professional growth\n\nNo one has done this before. We'll get things wrong - and that's okay! With your help, we'll get fewer things wrong, identify mistakes earlier, and improve processes to prevent future missteps.\n\nYou're in on the ground floor - you'll have a say in what we do and how we do it. By joining Swarm Technologies, you'll be joining a dynamic team on the bleeding edge of information (computer) security and blockchain - answering questions few have thought to ask.\n\n**If you're interested in**\n- technical challenges that cannot be solved via iteration\n- blockchain (Ethereum smart contracts in particular)\n- information security\n- malware reverse engineering automation\n- market design (a la Who Gets What and Why by Alvin Roth)\n- software development\n- unknown unknowns\n\n**then we're interested in you!**\n\n**The Ideal Candidate Is:**\n- independently motivated & self-directing\n- introspective: able to identify weak spots / problem areas our existing processes or code and suggest / implement solutions\n- takes an interest in information security topics - huge props for capture the flag (CTF) participation!\n- enjoys developing software\n\n**At Swarm Technologies, you'll tackle both big-picture and tactical problems, the following are a few examples.**\n\n**Example Big-Picture Problems**\n\nThe Ethereum block time leaves a lot to be desired for a marketplace that intends to supplant millions of malware scans a day.\n\nHow do we best reconcile millions of scans daily with a 15 second block time and today's block size limits?\n\nIn sum: PolySwarm must scale and must support scanning artifacts (files) that may contain confidential information. How do we best reconcile these needs with a default-public, Proof-of-Work Ethereum ecosystem?\n\n**Example Tactical Problem**\n\nPolySwarm is a twist on a prediction market - where security experts attempt to "predict" whether a file / URL or network traffic is malicious or benign. Alongside their prediction ("assertion"), experts "stake" a configurable amount of Nectar (NCT), PolySwarm's crypto token.\n\nSuppose Expert A is lazy and Expert B is a hardworking, upstanding security expert. It would be bad if Expert A was able to simply duplicate the assertions coming from Expert B, exploiting Expert B's hard work for profit. If assertions are placed directly on the public Ethereum blockchain, Expert A can do exactly that.\n\nHow can we design a system that keeps the assertion secret (so Expert B is out of luck) until some configured time, after which assertions are revealed and payouts distributed appropriately?\n\n**The Ideal Candidate possesses demonstrable experience in some or all of these technologies.**\n\nPolySwarm employs the following tools & languages:\nPython\nDocker (+ Swarm, Services, Stack)\nKubernetes (+ Helm)\nTerraform\nAnsible\nSolidity\nReact\nJavaScript\nRust\n\nRefer to our GitHub for examples of our usage:\n\n**We Offer**\n- Competitive salaries\n- Excellent health, dental, vision coverage\n- Paid vacation days\n- Travel (if you like). We have offices in San Diego, Puerto Rico and Tokyo and we often find ourselves travelling elsewhere. If travel interests you, we can scratch that itch.\n- Flexible work hours - outside of scheduled meetings, we don't care when you work, we care about your output.\n- Powerful servers, laptops, desktops - whatever you need to be most productive!

See more jobs at PolySwarm

# How do you apply?\n\n This job post is older than 30 days and the position is probably filled. Try applying to jobs posted recently instead.
FeedbackIf you find a bug, or have feedback, write it here. Please no job applications in here, click Apply instead! If you want to advertise, we do not do CPA/aff/perf ads ever.Thanks for the message! We will get back to you soon.

[Spam check] What is the name of Elon Musk's company going to Mars?

Send feedback