About the Role
We&aposre looking for a skilled Full Stack Developer to join our cybersecurity engineering team. You will design, develop, and maintain scalable, event-driven platforms and workflows that detect, visualise, and mitigate security risks. The ideal candidate has strong experience in both backend and frontend development, is cloud-native, and thrives in a DevSecOps-first environment.
Key Responsibilities
- Design and implement scalable, secure, and event-driven microservices using Python and GraphQL APIs.
- Build responsive frontend interfaces with React.js, integrated with real-time data sources and APIs.
- Work with both SQL (PostgreSQL, MySQL) and NoSQL (MongoDB, DynamoDB, etc.) databases for complex data workflows.
- Integrate and manage cloud-native services across GCP, AWS, and Azure.
- Containerise applications using Docker, orchestrate with Kubernetes, and manage CI / CD pipelines.
- Implement and optimise system workflows to support cybersecurity use cases like asset discovery, risk scoring, and anomaly detection.
- Collaborate with security engineers to integrate with threat intelligence platforms, scanners, and SIEMs.
- Contribute to architectural decisions and drive improvements in system performance, observability, and scalability.
- Write reusable, testable code and participate in code reviews and documentation.
Required Skills & Experience
Strong experience in Python (FastAPI, Flask, or Django) for backend APIs and logic. Proficiency in React.js with modern state management libraries (Redux, Zustand, etc.).Experience designing and consuming GraphQL APIs.Solid knowledge of event-driven architectures using tools like Kafka, Pub / Sub, SNS / SQS, or EventBridge.Hands-on with SQL and NoSQL databases, data modelling, and performance tuning.Proficient with Docker and Kubernetes for building and deploying microservices.Familiarity with cloud platforms : GCP, AWS, and / or Azure, including key services (e.g., IAM, Lambda, Cloud Functions, Storage, etc.).Experience building workflow engines or integrating with orchestration tools like Airflow, Temporal, or Step Functions.Understanding of basic cybersecurity concepts, OWASP Top 10, secure coding practices, and exposure to tools like Burp, Nmap, or Tenable is a big plus.Nice to Have Exposure to Infrastructure as Code (Terraform, Pulumi).Experience with authentication / authorisation flows (OAuth2, SAML, OpenID).Knowledge of vulnerability management, attack surface management, or threat intelligence systems.Familiarity with observability tools (Prometheus, Grafana, ELK, etc.).Show more
Show less