ProtonBlog

December 10, 2015

Proton seeks a FT Software Architect in SF to lead the design of new technical architectures and solutions, create and continuously monitor upgrades and implementation of all back end arch., including the app programming interface, manage arch. change requests and lead the redesign of software infrastructure to grow from supporting 100k to over 100M users. MS in CompSci plus 18 months experience as Software Architect req, inc fluency in developing in multiple environments, inc Android, iOS, backend to frontend.

Fax resumes to 866-849-7714.

Bescherm uw privéleven met Proton
Maak een gratis account

Gerelateerde artikelen

en
Google is one of the biggest obstacles to privacy. The Big Tech giant may offer quick access to information online, but it also controls vast amounts of your personal or business data. Recently, more people are becoming aware of the actual price you
What to do if someone steals your Social Security number
en
If you’re a United States citizen or permanent resident, you have a Social Security number (SSN). This number is the linchpin of much of your existence, linked to everything from your tax records to your credit cards. Theft is a massive problem, whic
compromised passwords
en
  • De basisbeginselen van privacy
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
en
  • De basisbeginselen van privacy
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • De basisbeginselen van privacy
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
en
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f