Description
As part of Waterfall’s R&D team, the candidate will contribute to following processes:
Manage, design, develop and support all CI-CD related infrastructures.
Automate processes following continuous integration, deployment, and delivery.
Create & Maintain application installers (Windows/Linux)
Improve and support Git workflows.
Research and integrate new technologies into the R&D stack.
Specific Requirements:
- At least 7 years of DevOps experience – mandatory.
- Deep knowledge and experience in TCP/IP and networking protocols.
- B.Sc in computer science or equivalent.
- Experience with Python, Shell scripting (Bash, Powershell), Containers, VM’s.
- Deep knowledge and experience with Windows and Linux server administration.
- Experience in one or more programming languages (such as C++, C#, Java) – an advantage.
- Attention to details and accuracy.
- Fluent in verbal and writing English.
- Troubleshooting skills.
- Team player.
- Solution-oriented with a “can do” attitude.
- Passionate about discovering how things work
Requirements
None
Top Skills
What We Do
Through our software-enabled hardware platforms, we enable secure and reliable operations, protecting against both today’s cybersecurity challenges and those yet to come.
Since 2007, Waterfall Security Solutions has been providing the highest level of protection for critical infrastructure and vital industries. With headquarters in Israel and offices in UAE, Singapore, USA, Europe, and Australia, Waterfall delivers the highest level of OT protection while enabling safe connectivity, visibility, and secure remote access for industrial systems.
Waterfall Security safeguards the most sensitive and critical infrastructures across a wide range of industries including Power, Oil & Gas, Water Utilities, Rail, Manufacturing, Facilities, and Mining & Metals.
As cyberattacks on critical infrastructure are on the rise, software alone is not able to deliver sufficient protections. Waterfall’s unidirectional technology uses an innovative approach, combining unique hardware paired with dedicated software that provides industrial systems with dedicated protection while still allowing remote visibility and remote access.
Attackers are physically restricted with a hardware enforced barrier that that stops OT cyberattacks and shields industrial controls from any outside attempts to plant malicious code or any other harmful activity.