Finding the best job has never been easier
Share
Who You Are
Problem-Specific Model Customization: Experience adapting neural network architectures like GANs (Generative Adversarial Networks), Autoencoders, Attention Mechanisms, and Transformers or developing novel architectures to address unique challenges in different domains (e.g., NLP, computer vision, time series analysis).
Handling High-Dimensional Data: Experience in managing and extracting useful patterns from high-dimensional data spaces, using techniques like dimensionality reduction or specialized network architectures.
Proficiency in NLP and LLM:Including experience with BERT, GPT, or similar, to effectively derive insights from structured and/or unstructured text data. Building custom real-world production NLP models for tasks like text generation or text summarization is a strong plus.
Innovative Solution Development: Ability to apply deep learning techniques innovatively to solve complex problems, often combining domain knowledge (from cybersecurity or other domains) and out-of-the-box thinking.
Model Scalability and Efficiency: Expertise in developing models that can be deployed in different environments, including understanding trade-offs between model complexity and performance.
Continuous Learning and Adaptation
What You Will Do
In this role, you will tackle some of the most challenging issues facing businesses today. You will do this through:
Model Development:Develop and implement advanced ML models and algorithms to tackle security problems, including threat detection, anomaly detection, and risk assessment.
Model Training and Evaluation:Lead the training, validation, and fine-tuning ML models using current techniques and libraries. Define and track security-specific metrics for model performance.
Solution Development:Build robust software systems to integrate, deploy, and maintain advanced ML models in production environments. This includes developing and optimizing software frameworks, ensuring seamless model integration, and rigorously testing systems to maintain high reliability and performance standards.
Deployment Strategy:
Documentation and Best Practices:Establish an effective process for machine learning and security operations, and maintain clear documentation of models, data pipelines, and security procedures.
Basic Qualifications
Preferred Qualifications
These jobs might be a good fit