
Remote Senior Full Stack Engineer - Account Takeover
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Ceros · Remote Europe, Remote UK, Vereinigtes Königreich · Remote
Doit international · Remote UK, Vereinigtes Königreich · Remote
Ceros · Remote Europe, Remote UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Coinbase · Remote - UK, Vereinigtes Königreich · Remote
Coinbase · Remote - UK, Vereinigtes Königreich · Remote
Coinbase · Remote - UK, Vereinigtes Königreich · Remote
Coinbase · Remote - UK, Vereinigtes Königreich · Remote
Addepar · Remote, UK, Vereinigtes Königreich · Remote
Addepar · Remote, UK, Vereinigtes Königreich · Remote
Addepar · Remote, UK, Vereinigtes Königreich · Remote
Abnormal security · Remote - UK, Vereinigtes Königreich · Remote
Jetzt bewerben
Oyster – Mit Oyster weltweit einstellen. Vereinfachte Gehaltsabrechnung und Compliance.
Gesponsert von OysterAbnormal Security is looking for a Senior Full Stack Engineer to join the Behavioral Security Products team. Our company is built around the idea of first understanding the person we are trying to protect using baselines of historic behaviour and ML models to determine what normal looks like for every employee of a company. Our team builds the features that take those insights and show our customers what is happening with their employees and their systems, as well as the tools and workflows for dealing with some of the most critical attacks companies can face: account takeovers.
The role will involve building out features to enable customers to more quickly diagnose potentially suspicious behaviour, to make it easier to catalogue that behaviour as an attack or as benign, and more controls to optimise how the system will behave according to their needs. It will require qualities such as:
#LI-JS1