Cloud Architect

Closed
F8th Inc.
Toronto, Ontario, Canada
Preferred learners
  • Anywhere
  • Academic experience
Categories
Data analysis Information technology
Skills
security engineering technical design kubernetes integration testing cyber security vulnerability research
Project scope
What is the main goal for this project?

F8th's development team is lead by our founder, who is a cybersecurity expert and developer. Prior to founding F8th, Jonathan had over 500 developers reporting to him. He is an excellent coach and leader.

In this project, you would join the development team as a cloud engineer.

In this role, your tasks woould be broad and varied depending on your skill level and the company's requirements. Tasks could include:

  • Evaluate, maintain, and optimize the product architecture
  • Strong expertise in: Kubernetes, Helm, Cloud object storage
  • Conduct performance tests on our product and architecture
  • Partake in technical design reviews, integration, testing, and documentation work
  • Run vulnerability valuation and fizzing of protocols, hardware, and software
  • Conduct Research & Development to enhance our product
  • Apply system security engineering principles to deliver real solutions premeditated to enhance the security position
  • Identify threats and develop suitable defense measures, evaluate system changes for security implications, and recommend enhancements, research

If this engagement is undertaken as a project, a clear set of objectives and deliverables will be set for you to accomplish so you will have something tangible to add to your skill set.

How will you support learners in completing the project?

You will be mentored and supervised on a daily basis by our founder, cyber security expert Jonathan Gagne

About the company
  • https://www.f8th.ai/
  • 2 - 10 employees
  • Banking & finance, It & computing, Technology, Business & management

F8th’s mission is to provide solutions to organizations against the latest cyber threats, enforce user privacy and corporate data security, and mitigate the massive damages and losses caused by data breaches.

F8th’s behavioural biometric analysis (BBA) works by analyzing mouse, keyboard and touchscreen movements to discern the unique identity of the user. Unlike conventional two-step authentication systems, F8th uses artificial intelligence, machine learning and deep learning to analyze 100s of these inputs in real time to identify an authorized user vs a fraudster. Moreover, F8th passively protects the customer and corporate data by continuously authenticating users through their human behaviors. Unlike every other tracker, F8th uses data that websites need to provide services, hence it is not impacted by browser tracker blockers, and is completely compliant with the new data privacy regulations.