• Laptop sale in Delhi Abx rentals

    Contact us – +91 9891800178 , 91-9990093932

    Hey there! So, if you’re looking for a sweet deal on laptops in Delhi, you should definitely check out ABX Rentals. They’ve got a killer selection of laptops at really affordable prices. Whether you’re in the market for a sleek new MacBook or a powerful gaming laptop, ABX Rentals has got you covered. Plus, their customer service is top-notch — they’ll help you find the perfect laptop for your needs and budget. And the best part? You can rent-to-own, so you can try out different laptops before committing to buy. So next time you’re in Delhi and need a new laptop, be sure to swing by ABX Rentals and score yourself a great deal!
    #laptop #laptops #desktop #desktops #computer #computers #server #servers #printer #printers #abx #pc #pc's #gamingpc
    Laptop sale in Delhi Abx rentals Contact us – +91 9891800178 , 91-9990093932 Hey there! So, if you’re looking for a sweet deal on laptops in Delhi, you should definitely check out ABX Rentals. They’ve got a killer selection of laptops at really affordable prices. Whether you’re in the market for a sleek new MacBook or a powerful gaming laptop, ABX Rentals has got you covered. Plus, their customer service is top-notch — they’ll help you find the perfect laptop for your needs and budget. And the best part? You can rent-to-own, so you can try out different laptops before committing to buy. So next time you’re in Delhi and need a new laptop, be sure to swing by ABX Rentals and score yourself a great deal! #laptop #laptops #desktop #desktops #computer #computers #server #servers #printer #printers #abx #pc #pc's #gamingpc
    ·590 Views
  • How secure is a Binance exchange clone?

    The security of a Binance exchange clone depends on the measures implemented by its developers and operators. To ensure a high level of security, several key factors should be considered:

    Encryption: Implementing strong encryption protocols for user data, transactions, and communications is essential. This helps protect sensitive information from unauthorized access.

    Two-factor authentication (2FA): Enabling 2FA adds an extra layer of security by requiring users to provide a second form of verification, such as a unique code generated by an authenticator app, in addition to their login credentials.

    Secure architecture: Building the exchange clone with a secure architecture helps prevent vulnerabilities and potential attacks. Employing industry best practices and conducting thorough security audits can help identify and address any weaknesses in the system.

    Regular security audits: Performing regular security audits helps identify and address any vulnerabilities or weaknesses in the exchange clone's code and infrastructure. This ensures that security measures are up to date and effective.

    Cold storage: Storing the majority of user funds in offline or cold storage wallets can protect them from online threats. Only a small portion of funds needed for daily operations should be kept in hot wallets connected to the internet.

    DDoS protection: Implementing robust DDoS (Distributed Denial of Service) protection helps defend against malicious attempts to overwhelm the exchange's servers and disrupt its services.

    Compliance with regulations: Adhering to relevant legal and regulatory requirements, such as KYC (Know Your Customer) and AML (Anti-Money Laundering) procedures, helps mitigate risks associated with fraudulent activities and enhances the security of the platform.

    Read: https://www.turnkeytown.com/binance-clone

    #binanceclone #binanceclonescript
    How secure is a Binance exchange clone? The security of a Binance exchange clone depends on the measures implemented by its developers and operators. To ensure a high level of security, several key factors should be considered: Encryption: Implementing strong encryption protocols for user data, transactions, and communications is essential. This helps protect sensitive information from unauthorized access. Two-factor authentication (2FA): Enabling 2FA adds an extra layer of security by requiring users to provide a second form of verification, such as a unique code generated by an authenticator app, in addition to their login credentials. Secure architecture: Building the exchange clone with a secure architecture helps prevent vulnerabilities and potential attacks. Employing industry best practices and conducting thorough security audits can help identify and address any weaknesses in the system. Regular security audits: Performing regular security audits helps identify and address any vulnerabilities or weaknesses in the exchange clone's code and infrastructure. This ensures that security measures are up to date and effective. Cold storage: Storing the majority of user funds in offline or cold storage wallets can protect them from online threats. Only a small portion of funds needed for daily operations should be kept in hot wallets connected to the internet. DDoS protection: Implementing robust DDoS (Distributed Denial of Service) protection helps defend against malicious attempts to overwhelm the exchange's servers and disrupt its services. Compliance with regulations: Adhering to relevant legal and regulatory requirements, such as KYC (Know Your Customer) and AML (Anti-Money Laundering) procedures, helps mitigate risks associated with fraudulent activities and enhances the security of the platform. Read: https://www.turnkeytown.com/binance-clone #binanceclone #binanceclonescript
    Like
    1
    ·4567 Views
  • How do you ensure scalability in your cryptocurrency software development?

    Ensuring scalability in cryptocurrency software development involves designing the software in a way that can handle a large volume of users, transactions, and data. There are several techniques that can be used to achieve scalability in cryptocurrency software development, including:

    Distributed architecture: Implementing a distributed architecture that allows for multiple nodes to participate in the processing of transactions and storage of data. This helps to distribute the load and reduce the burden on any single node.

    Caching: Implementing caching mechanisms that allow for frequently accessed data to be stored in memory, reducing the number of database queries required and improving performance.

    Sharding: Dividing the database into smaller, more manageable parts called shards, which can be distributed across multiple nodes. This can improve performance and reduce the risk of a single point of failure.

    Load balancing: Implementing load balancing mechanisms that distribute the load across multiple servers to prevent any single server from becoming overloaded.

    Cloud hosting: Using cloud hosting services that allow for on-demand scalability of computing resources, such as Amazon Web Services or Microsoft Azure.

    By employing these techniques and other best practices, cryptocurrency software development companies can ensure that their solutions can handle a large volume of users, transactions, and data, and can scale as needed to accommodate growth.

    Read: https://www.turnkeytown.com/cryptocurrency-application-development

    #cryptoapp #cryptoapplication


    How do you ensure scalability in your cryptocurrency software development? Ensuring scalability in cryptocurrency software development involves designing the software in a way that can handle a large volume of users, transactions, and data. There are several techniques that can be used to achieve scalability in cryptocurrency software development, including: Distributed architecture: Implementing a distributed architecture that allows for multiple nodes to participate in the processing of transactions and storage of data. This helps to distribute the load and reduce the burden on any single node. Caching: Implementing caching mechanisms that allow for frequently accessed data to be stored in memory, reducing the number of database queries required and improving performance. Sharding: Dividing the database into smaller, more manageable parts called shards, which can be distributed across multiple nodes. This can improve performance and reduce the risk of a single point of failure. Load balancing: Implementing load balancing mechanisms that distribute the load across multiple servers to prevent any single server from becoming overloaded. Cloud hosting: Using cloud hosting services that allow for on-demand scalability of computing resources, such as Amazon Web Services or Microsoft Azure. By employing these techniques and other best practices, cryptocurrency software development companies can ensure that their solutions can handle a large volume of users, transactions, and data, and can scale as needed to accommodate growth. Read: https://www.turnkeytown.com/cryptocurrency-application-development #cryptoapp #cryptoapplication
    WWW.TURNKEYTOWN.COM
    Cryptocurrency Application Development Company | Create Crypto App Today
    Now cryptocurrency application development is just a click away! Partner with TurnkeyTown, a leading crypto app development company, to build an advanced, feature-packed, centralized or decentralized crypto app.
    ·4070 Views
  • How To Enable Missing High Performance Plan Ultimate Performance Power Plan Windows 11. to give an extra boost to high-power systems (think workstations and servers) by optimizing the High-Performance power plan. It’s geared toward reducing or eliminating micro-latencies associated with fine-grained power management techniques. Microsoft has added an “Ultimate Performance” power scheme to Windows Update. It’s built upon the High-Performance power
    How To Enable Missing High Performance Plan Ultimate Performance Power Plan Windows 11. to give an extra boost to high-power systems (think workstations and servers) by optimizing the High-Performance power plan. It’s geared toward reducing or eliminating micro-latencies associated with fine-grained power management techniques. Microsoft has added an “Ultimate Performance” power scheme to Windows Update. It’s built upon the High-Performance power
    Like
    2
    ·2075 Views
  • $130000 - $170000 / Year

    Location

    KORE1 Los Angeles, CA Hybrid

    Type

    Full Time

    Status

    Open

    About the job
    THIS ROLE CAN BE DONE MOSTLY REMOTE W/ QUARTERLY TRAVEL (FOR UP TO 1 WEEK AT A TIME) TO PLAYA VISTA, CA BY THOSE LOCATED IN THE US / AUTHORIZED FOR WORK IN THE US. YOU WOULD BE REQUIRED TO WORK PDT / PST TIME ZONE DAILY.

    Our client is looking for a Sr. Cyber Security Engineer to join our dynamic Technology team.

    In this role, you will be responsible for the overall security of the organization. This encompasses end-user awareness training, utilizing user behavioral and threat-based analytics to identify issues, reviewing on-going SOX, PCI, and other regulatory compliance reqs (to implement those policies in our tools), assisting in developing policies, playbooks, etc. all while working with various business units for compliance.


    What You'll Do:

    Work closely with IT management to define security practices for the organization and present recommendations to both technical and non-technical team members
    Work closely with the Director of IT to help define a security strategy and roadmap
    Perform gap and risk assessments of our current organization and make recommendations on how to remediate
    Help consolidate redundant security tools (for example: MFA / SSO is currently being done w/ both Okta & Dou, Dou will be retired)
    Contribute to monitoring (SIEM), MDM, end point management, vulnerability detection, etc.
    Help fix / improve patch management (currently our servers aren't all automatically being patched)
    Understand and explain the underlying techniques that hackers use to exploit and penetrate systems
    Maintain a strong technical background to help remedy any vulnerabilities in the organization
    Ongoing SOX and PCI compliance and familiarization of the processes
    Work closely with security vendors, regularly review logs, UBA, and other security tools and respond accordingly
    Map security findings to business impact and communicate security messaging effectively across all business units and to the leadership team
    Work closely with Software Engineering and BI teams to ensure our AWS infrastructure is secure

    You'll love this job if you are:

    A strong communicator and collaborator. From elevator chats to boardroom meetings, you always know the best way to communicate with others to forge effective connections.
    Dedicated and fast-moving. You're known to operate with passion, urgency, focus, and discipline
    A talented juggler. You successfully manage competing priorities, and you make it look easy
    Results oriented and a self-starter. You love to exceed set goals and take on new projects
    The definition of integrity. You represent and inspire the highest ethical standards.
    Adaptable and ambitious. You will enthusiastically take on other assignments as needed to support your team!

    What You'll Need:

    Bachelor's degree is a plus
    Relevant certifications are a plus.
    5+ years of Cyber Security engineering experience that includes:
    Experience hardening systems, specifically cloud-heavy environments ideally w/ AWS
    Familiarity with cloud computing technology and various means to secure them.
    Ideally working in an environment that is 50% or more cloud-based leveraging cloud for IaaS (we are almost 100% in the cloud w/ AWS)
    Ideally in the context of securing workloads / servers in the cloud
    Knowledge of different attack vectors and methods helpful
    Experience analyzing an exploited system and remediating accordingly
    Experience monitoring threat actor tactics, techniques and procedures (TTP's) helpful.
    Implementation/configuration of as many of the following tools as possible (as our environment is a bit of a fixer upper requiring tool re-implementation, implementation, migration/consolidation)
    AWS security (any tools w/in that context are a plus)
    Windows / Linux servers, including Linux command line for AWS security
    Splunk for SIEM (including regex)
    Netskope for CASB (including Curl / Boto / Python)
    Crowdstrike or a comparable tool for threat hunting / end point mgmt (must be able to learn/ramp up w/ Crowdstrike quickly if you don't have it)
    Proofpoint or a comparable tool for email / phishing / DLP (must be able to learn/ramp up w/ Proofpoint quickly if you don't have it)
    Tenable or a comparable tool for vulnerability mgmt tool (must be able to learn/ramp up w/ Tenable quickly if you don't have it)
    Any SSO / MFA (Okta / Duo preferred)
    Any MDM tool (VMware Workspace One preferred)
    AD / Azure AD
    Former infrastructure administration / engineering in any of the following is helpful
    Solid experience w/ OS (Max, Windows, Linux)
    Network devices like firewalls a big plus (especially cloud-based)
    Virtualization (VMware and/or Hyper-V welcome)
    WAF - web application firewalls a big plus
    We have a dedicated IT team you will work w/ (in the context of hardening our environment)
    Good business sense to logically think through problems and deliver a balanced approach to security
    About the job THIS ROLE CAN BE DONE MOSTLY REMOTE W/ QUARTERLY TRAVEL (FOR UP TO 1 WEEK AT A TIME) TO PLAYA VISTA, CA BY THOSE LOCATED IN THE US / AUTHORIZED FOR WORK IN THE US. YOU WOULD BE REQUIRED TO WORK PDT / PST TIME ZONE DAILY. Our client is looking for a Sr. Cyber Security Engineer to join our dynamic Technology team. In this role, you will be responsible for the overall security of the organization. This encompasses end-user awareness training, utilizing user behavioral and threat-based analytics to identify issues, reviewing on-going SOX, PCI, and other regulatory compliance reqs (to implement those policies in our tools), assisting in developing policies, playbooks, etc. all while working with various business units for compliance. What You'll Do: Work closely with IT management to define security practices for the organization and present recommendations to both technical and non-technical team members Work closely with the Director of IT to help define a security strategy and roadmap Perform gap and risk assessments of our current organization and make recommendations on how to remediate Help consolidate redundant security tools (for example: MFA / SSO is currently being done w/ both Okta & Dou, Dou will be retired) Contribute to monitoring (SIEM), MDM, end point management, vulnerability detection, etc. Help fix / improve patch management (currently our servers aren't all automatically being patched) Understand and explain the underlying techniques that hackers use to exploit and penetrate systems Maintain a strong technical background to help remedy any vulnerabilities in the organization Ongoing SOX and PCI compliance and familiarization of the processes Work closely with security vendors, regularly review logs, UBA, and other security tools and respond accordingly Map security findings to business impact and communicate security messaging effectively across all business units and to the leadership team Work closely with Software Engineering and BI teams to ensure our AWS infrastructure is secure You'll love this job if you are: A strong communicator and collaborator. From elevator chats to boardroom meetings, you always know the best way to communicate with others to forge effective connections. Dedicated and fast-moving. You're known to operate with passion, urgency, focus, and discipline A talented juggler. You successfully manage competing priorities, and you make it look easy Results oriented and a self-starter. You love to exceed set goals and take on new projects The definition of integrity. You represent and inspire the highest ethical standards. Adaptable and ambitious. You will enthusiastically take on other assignments as needed to support your team! What You'll Need: Bachelor's degree is a plus Relevant certifications are a plus. 5+ years of Cyber Security engineering experience that includes: Experience hardening systems, specifically cloud-heavy environments ideally w/ AWS Familiarity with cloud computing technology and various means to secure them. Ideally working in an environment that is 50% or more cloud-based leveraging cloud for IaaS (we are almost 100% in the cloud w/ AWS) Ideally in the context of securing workloads / servers in the cloud Knowledge of different attack vectors and methods helpful Experience analyzing an exploited system and remediating accordingly Experience monitoring threat actor tactics, techniques and procedures (TTP's) helpful. Implementation/configuration of as many of the following tools as possible (as our environment is a bit of a fixer upper requiring tool re-implementation, implementation, migration/consolidation) AWS security (any tools w/in that context are a plus) Windows / Linux servers, including Linux command line for AWS security Splunk for SIEM (including regex) Netskope for CASB (including Curl / Boto / Python) Crowdstrike or a comparable tool for threat hunting / end point mgmt (must be able to learn/ramp up w/ Crowdstrike quickly if you don't have it) Proofpoint or a comparable tool for email / phishing / DLP (must be able to learn/ramp up w/ Proofpoint quickly if you don't have it) Tenable or a comparable tool for vulnerability mgmt tool (must be able to learn/ramp up w/ Tenable quickly if you don't have it) Any SSO / MFA (Okta / Duo preferred) Any MDM tool (VMware Workspace One preferred) AD / Azure AD Former infrastructure administration / engineering in any of the following is helpful Solid experience w/ OS (Max, Windows, Linux) Network devices like firewalls a big plus (especially cloud-based) Virtualization (VMware and/or Hyper-V welcome) WAF - web application firewalls a big plus We have a dedicated IT team you will work w/ (in the context of hardening our environment) Good business sense to logically think through problems and deliver a balanced approach to security
    ·7548 Views
  • $50 - $80 / Hour

    Location

    iTalent Digital Pleasanton, CA ( On-site )

    Type

    Full Time

    Status

    Open

    About the job


    iTalent Digital is seeking a Security Analyst to join our clients Cyber Security team. The ideal candidate will be responsible for assigning tasks and overseeing staff in the areas of Security Architecture, developing and updating security policies and standards, security consulting to business departments, security incident management, forensic, security awareness training, threat analysis, new security technologies evaluation, risk assessment, vulnerability/threat identification and mitigation, and security framework design, development and implementation.



    Required qualifications and skills

    5+ Years’ experience in information security
    CISA, CISM, or CISSP Certification is required
    TECHNICAL SECURITY PROJECT MANAGEMENT SKILLS
    WORKING EXPERIENCE USING BEST PRACTICES STANDARDS AND FRAMEWORKS: ISO 27001/27002, PCI:DSS V3; GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF, CIS RAM
    WORKING EXPERIENCE, AT A MINIMUM:
    HARDWARE: NETWORK SWITCHES, ROUTERS, LOAD BALANCERS, SERVERS,STORAGE SYSTEMS, END-USER SYSTEMS, MOBILE DEVICES, OR OTHER DEVICES THAT ENABLE THE ORGANIZATION TO COMPLETE ITS MISSION
    OPERATING SYSTEMS: UNIX, LINUX, WINDOWS o NETWORK: LAN, WAN, INTERNET, PROXY/FILTERING, FIREWALL, VPN, DMZ
    NETWORK PROTOCOLS SUCH AS TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, ETC.
    DATABASES: ORACLE, SQL, MYSQL
    CLOUD PLATFORMS: IAAS, PAAS, SAAS
    SECURITY CONCEPTS SUCH AS ENCRYPTION, HARDENING, ETC.
    GRC
    ACTIVE DIRECTORY
    PROGRAMMING LANGUAGES ARE A PLUS
    Preferred qualifications and skills

    · Strong analytical and critical thinking skills

    · Excellent written and oral communication skills to effectively communicate across all levels of the organization

    · Proven ability to present to a Senior Management Level and Executive audience

    · Working experience of security, policy compliance, and governance frameworks including the

    · NIST-800 series, PCI, ISO 27001/27001, ITIL, and COBIT

    · Expert knowledge in security project management practices

    · Self-motivated/Self-Starter/Proactive, working closely and actively communicating with team

    · members to accomplish time critical tasks and deliverables

    · Working experience in a highly regulated environment and managing information risks and

    · expectations across multiple stakeholder groups

    · Working experience of emergent security risks

    · Convey and explain complex problems and solutions in an understandable language to both

    · technical and non-technical persons

    · Think creatively and critically, analyzing complex problems, weighing multiple solutions, and

    · carefully selecting solutions appropriate to the business needs, project scope, and available

    · resources

    · Take responsibility for the integrity of the solution

    · Ability to be a strategic thinker

    · Demonstrated ability to influence others

    · Experience in managing multiple projects



    Core Competencies:



    · Act with integrity

    · Use sound judgement

    · Commitment to quality

    · Demonstrate adaptability

    · Innovate

    · Think strategically

    · Communicate effectively and influence others

    · Work well both independently and as part of a team



    Education

    Bachelor's Degree

    Company description

    A woman- and minority-owned digital consulting company, we celebrate individuals and diversity, cultivating a culture where our people can excel and lead balanced lives. Recruitment at iTalent is guided by an unwavering principle: Only hire the best. Because we have the best people, we have the privilege of working with the best clients, doing the best work, and effecting transformative change at work and in our communities.



    What you get:



    You get the chance to work with some of the best brands and high-performance teams out there! iTalent offers our W2 consultants excellent benefits such as medical, dental, vision, life insurance, and 401K + matching. We are growing and we want to see you grow!
    About the job iTalent Digital is seeking a Security Analyst to join our clients Cyber Security team. The ideal candidate will be responsible for assigning tasks and overseeing staff in the areas of Security Architecture, developing and updating security policies and standards, security consulting to business departments, security incident management, forensic, security awareness training, threat analysis, new security technologies evaluation, risk assessment, vulnerability/threat identification and mitigation, and security framework design, development and implementation. Required qualifications and skills 5+ Years’ experience in information security CISA, CISM, or CISSP Certification is required TECHNICAL SECURITY PROJECT MANAGEMENT SKILLS WORKING EXPERIENCE USING BEST PRACTICES STANDARDS AND FRAMEWORKS: ISO 27001/27002, PCI:DSS V3; GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF, CIS RAM WORKING EXPERIENCE, AT A MINIMUM: HARDWARE: NETWORK SWITCHES, ROUTERS, LOAD BALANCERS, SERVERS,STORAGE SYSTEMS, END-USER SYSTEMS, MOBILE DEVICES, OR OTHER DEVICES THAT ENABLE THE ORGANIZATION TO COMPLETE ITS MISSION OPERATING SYSTEMS: UNIX, LINUX, WINDOWS o NETWORK: LAN, WAN, INTERNET, PROXY/FILTERING, FIREWALL, VPN, DMZ NETWORK PROTOCOLS SUCH AS TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, ETC. DATABASES: ORACLE, SQL, MYSQL CLOUD PLATFORMS: IAAS, PAAS, SAAS SECURITY CONCEPTS SUCH AS ENCRYPTION, HARDENING, ETC. GRC ACTIVE DIRECTORY PROGRAMMING LANGUAGES ARE A PLUS Preferred qualifications and skills · Strong analytical and critical thinking skills · Excellent written and oral communication skills to effectively communicate across all levels of the organization · Proven ability to present to a Senior Management Level and Executive audience · Working experience of security, policy compliance, and governance frameworks including the · NIST-800 series, PCI, ISO 27001/27001, ITIL, and COBIT · Expert knowledge in security project management practices · Self-motivated/Self-Starter/Proactive, working closely and actively communicating with team · members to accomplish time critical tasks and deliverables · Working experience in a highly regulated environment and managing information risks and · expectations across multiple stakeholder groups · Working experience of emergent security risks · Convey and explain complex problems and solutions in an understandable language to both · technical and non-technical persons · Think creatively and critically, analyzing complex problems, weighing multiple solutions, and · carefully selecting solutions appropriate to the business needs, project scope, and available · resources · Take responsibility for the integrity of the solution · Ability to be a strategic thinker · Demonstrated ability to influence others · Experience in managing multiple projects Core Competencies: · Act with integrity · Use sound judgement · Commitment to quality · Demonstrate adaptability · Innovate · Think strategically · Communicate effectively and influence others · Work well both independently and as part of a team Education Bachelor's Degree Company description A woman- and minority-owned digital consulting company, we celebrate individuals and diversity, cultivating a culture where our people can excel and lead balanced lives. Recruitment at iTalent is guided by an unwavering principle: Only hire the best. Because we have the best people, we have the privilege of working with the best clients, doing the best work, and effecting transformative change at work and in our communities. What you get: You get the chance to work with some of the best brands and high-performance teams out there! iTalent offers our W2 consultants excellent benefits such as medical, dental, vision, life insurance, and 401K + matching. We are growing and we want to see you grow!
    ·6044 Views
  • $90000 - $130000 / Year

    Location

    J.S. Held New York, NY, USA

    Type

    Full Time

    Status

    Open


    The Team and Job Summary

    We are seeking a Senior Associate to join our Blockchain and Cryptocurrency Financial Investigations practice. This is a unique opportunity for an entrepreneurial, highly driven person with a well-rounded skill set to join the JS Held team. The ideal person for this role will need to not only have a strong grasp of investigations, but also be a flexible and a strategic thinker able to take on a variety of tasks. Specifically, we are looking to add an individual who has a developed understanding of blockchain and cryptocurrency. This role will not only be investigatory in nature but will encompass many of the financial crime related elements that the cryptocurrency industry is experiencing.



    Job Responsibilities

    Utilize knowledge of databases and programming languages to analyze and interpret data, including historical financial, operational, and transactional data
    Identify, research, and organize information to assess the quality of data to facilitate effective analysis, identifying any potentially sensitive content
    Execute projects involving the identification, collection, processing, review, and production of electronic data relevant to security and regulatory investigations
    Create, prepare, and validate analyses, reports, presentations, and other deliverables regarding project scope and results of work performed
    Participate in client meetings to review results of work performed
    Responsible for management of day-to-day project activities, including interaction with other team members, professionals from other firms, and client staff
    Ability to understand, analyze, and trace cryptocurrency transactions
    Required Qualifications



    BA/BS or MA/MS in Computer Science, Cyber Security, MIS, Business Analytics, or another relevant field
    Strong background in the analysis of accounting, finance, insurance, manufacturing and other real world transactional data sets
    3+ years of experience working in a consulting firm or similar environment
    High level of proficiency in Python, Java, C or equivalent
    Proficiency in SQL. Experience with both traditional and cloud-based database servers


    Preferred Qualifications



    Someone who is naturally curious, listens carefully and motived to begin the problem-solving process once you have the information you need.
    Possess strong quantitative and qualitative research and analytical skills.
    Able to adapt quickly.
    Relevant experience in blockchain and cryptocurrency is preferred.
    Programming skills are a plus: Python, R, SQL, Solidity, Go, Rust.
    Outstanding at written and speaking skills; must be able to create status reports, write official reports, forensic reports, and demonstrate an ability to convey the complexity of blockchain and cryptocurrency in easy-to-understand ways.
    Well-developed analytical skills and the ability to provide clarity to complex issues and synthesize large amounts of information.
    Experience with Blockchain analytics platforms, including TRM Labs, or equivalent.
    Certified Bitcoin Professional or Cryptocurrency Investigator preferred.


    Physical and Mental Job Qualifications

    Our mission is to serve as trusted, expert advisors to organizations around the world facing high-stakes situations that demand urgent attention, exceptional knowledge, staunch integrity and objective, clear- cut analysis and advice.



    Some of the Benefits We Have Include

    J.S. Held understands all our employees are people and sometimes life needs flexibility. We work to always provide an environment that best supports and suits our team’s needs.

    Our flexible work environment allows employees to work remotely, when needed
    Generous PTO Policy
    Medical, Dental, and Vision Insurance
    401k Match
    Commuter Benefits


    A reasonable estimate of the salary range for this role is $90,000 - $130,000. Any offered salary range is based on a wide array of factors including but not limited to skillset, experience, training, location, scope of role, management responsibility, etc.


    Other Duties

    Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

    By submitting your application, you acknowledge that you have read the J.S. Held Online Privacy Notice and hereby freely and unambiguously give informed consent to the collection, processing, use, and storage of your personal information as required and described therein.

    Please explore what we’re all about at www.jsheld.com.



    EEO and Job Accommodations

    We embrace diversity and our commitment to building a team and environment that fosters professional and personal enrichment is unwavering. We are greater when we are equal!
    The Team and Job Summary We are seeking a Senior Associate to join our Blockchain and Cryptocurrency Financial Investigations practice. This is a unique opportunity for an entrepreneurial, highly driven person with a well-rounded skill set to join the JS Held team. The ideal person for this role will need to not only have a strong grasp of investigations, but also be a flexible and a strategic thinker able to take on a variety of tasks. Specifically, we are looking to add an individual who has a developed understanding of blockchain and cryptocurrency. This role will not only be investigatory in nature but will encompass many of the financial crime related elements that the cryptocurrency industry is experiencing. Job Responsibilities Utilize knowledge of databases and programming languages to analyze and interpret data, including historical financial, operational, and transactional data Identify, research, and organize information to assess the quality of data to facilitate effective analysis, identifying any potentially sensitive content Execute projects involving the identification, collection, processing, review, and production of electronic data relevant to security and regulatory investigations Create, prepare, and validate analyses, reports, presentations, and other deliverables regarding project scope and results of work performed Participate in client meetings to review results of work performed Responsible for management of day-to-day project activities, including interaction with other team members, professionals from other firms, and client staff Ability to understand, analyze, and trace cryptocurrency transactions Required Qualifications BA/BS or MA/MS in Computer Science, Cyber Security, MIS, Business Analytics, or another relevant field Strong background in the analysis of accounting, finance, insurance, manufacturing and other real world transactional data sets 3+ years of experience working in a consulting firm or similar environment High level of proficiency in Python, Java, C or equivalent Proficiency in SQL. Experience with both traditional and cloud-based database servers Preferred Qualifications Someone who is naturally curious, listens carefully and motived to begin the problem-solving process once you have the information you need. Possess strong quantitative and qualitative research and analytical skills. Able to adapt quickly. Relevant experience in blockchain and cryptocurrency is preferred. Programming skills are a plus: Python, R, SQL, Solidity, Go, Rust. Outstanding at written and speaking skills; must be able to create status reports, write official reports, forensic reports, and demonstrate an ability to convey the complexity of blockchain and cryptocurrency in easy-to-understand ways. Well-developed analytical skills and the ability to provide clarity to complex issues and synthesize large amounts of information. Experience with Blockchain analytics platforms, including TRM Labs, or equivalent. Certified Bitcoin Professional or Cryptocurrency Investigator preferred. Physical and Mental Job Qualifications Our mission is to serve as trusted, expert advisors to organizations around the world facing high-stakes situations that demand urgent attention, exceptional knowledge, staunch integrity and objective, clear- cut analysis and advice. Some of the Benefits We Have Include J.S. Held understands all our employees are people and sometimes life needs flexibility. We work to always provide an environment that best supports and suits our team’s needs. Our flexible work environment allows employees to work remotely, when needed Generous PTO Policy Medical, Dental, and Vision Insurance 401k Match Commuter Benefits A reasonable estimate of the salary range for this role is $90,000 - $130,000. Any offered salary range is based on a wide array of factors including but not limited to skillset, experience, training, location, scope of role, management responsibility, etc. Other Duties Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice. By submitting your application, you acknowledge that you have read the J.S. Held Online Privacy Notice and hereby freely and unambiguously give informed consent to the collection, processing, use, and storage of your personal information as required and described therein. Please explore what we’re all about at www.jsheld.com. EEO and Job Accommodations We embrace diversity and our commitment to building a team and environment that fosters professional and personal enrichment is unwavering. We are greater when we are equal!
    ·3593 Views
  • $5000 - $8000 / Month

    Location

    Doshi App Limited , London

    Type

    Full Time

    Status

    Open

    About the Job
    We are looking for a hands-on digital marketing rockstar who is in tune with Web3 and embedded in digital communities. The role requires an entrepreneurial leader who can grow an audience from 0-1, build a team of growth hackers, content creators, and community builders and foster a thriving community. As a founding employee, you’ll own Doshi’s growth strategy and report directly to the CEO.

    Responsibilities

    Owning the end-to-end marketing funnel, from driving awareness to converting users in the Doshi’s app.
    Driving our NFT and Discord strategy (contest & giveaways, partner servers, and community building)
    Leading and executing our content strategy across our owned channels (Newsletters, Blog posts and thought leadership)
    Effectively using social media for our owned channels and paid partnerships (Twitter, TikTok, Instagram, Reddit)
    Developing and optimising our referral programme and strategy
    Managing the marketing budget and allocation of ad spend.
    Curate and lead campaigns in areas such as referral marketing, influencer marketing, and SEO.
    Building and training a team of content creators and community managers.
    Qualifications

    4+ of work experience in Growth Marketing.
    Worked on Crypto/Web3 based projects
    A thoughtleader by nature who has build a following across Twitter, Newsletters, or other media
    Has built an audience from scratch.
    Analytical and Data-driven.
    Benefits
    $60,000 - $100,000
    Equity stake (0.5% - 1.5%)
    Token and NFT airdrops
    Remote and flexible working accommodations

    About us
    We are is on a mission to provide millions of teens access to financial freedom. Recently pre-seed funded, our crypto learning wallet is fun, safe and family-friendly so everyone, regarless of age, can be part of web3. We are building an ecosystem for teens to safely learn, invest and interact with the web3 ecosystem.


    Skills

    growth marketing, social media marketing, community management, paid social, Google Adwords, newsletter automation, A/B testing

    Compensation

    5000 - 8000 USD / month + Equity
    About the Job We are looking for a hands-on digital marketing rockstar who is in tune with Web3 and embedded in digital communities. The role requires an entrepreneurial leader who can grow an audience from 0-1, build a team of growth hackers, content creators, and community builders and foster a thriving community. As a founding employee, you’ll own Doshi’s growth strategy and report directly to the CEO. Responsibilities Owning the end-to-end marketing funnel, from driving awareness to converting users in the Doshi’s app. Driving our NFT and Discord strategy (contest & giveaways, partner servers, and community building) Leading and executing our content strategy across our owned channels (Newsletters, Blog posts and thought leadership) Effectively using social media for our owned channels and paid partnerships (Twitter, TikTok, Instagram, Reddit) Developing and optimising our referral programme and strategy Managing the marketing budget and allocation of ad spend. Curate and lead campaigns in areas such as referral marketing, influencer marketing, and SEO. Building and training a team of content creators and community managers. Qualifications 4+ of work experience in Growth Marketing. Worked on Crypto/Web3 based projects A thoughtleader by nature who has build a following across Twitter, Newsletters, or other media Has built an audience from scratch. Analytical and Data-driven. Benefits $60,000 - $100,000 Equity stake (0.5% - 1.5%) Token and NFT airdrops Remote and flexible working accommodations About us We are is on a mission to provide millions of teens access to financial freedom. Recently pre-seed funded, our crypto learning wallet is fun, safe and family-friendly so everyone, regarless of age, can be part of web3. We are building an ecosystem for teens to safely learn, invest and interact with the web3 ecosystem. Skills growth marketing, social media marketing, community management, paid social, Google Adwords, newsletter automation, A/B testing Compensation 5000 - 8000 USD / month + Equity
    Like
    Love
    3
    2 Comments ·7335 Views