Roles

Viz engineer Security engineer

Description

Graphistry is a Gartner-awarded startup used by fraud/cyber/BI/supplychain/misinfo/... analysts to see and correlate using our visual graph AI platform. With louie.ai (generative AI), they can now talk with their many databases in natural language while having L.O.U.I.E. generate the queries, GPU visualizations, & analyses for them. We partner with companies like Nvidia & AWS to enable end-to-end GPU compute so operational teams can do all this at previously impossible scales and interactivity. Some projects folks may know us for include having donated the web tier of Apache Arrow used by performance-oriented data visualization frameworks, incubating what became Nvidia RAPIDS.AI, and our own server<>client GPU accelerated data visualization engine. We are looking for multiple candidates: - Visualization engineer - Scaling server/client GPU infoviz We are looking for a visualization engineer excited about enabling analysts to dig into bigger and trickier data. The near-term projects are around initiatives like increasing our visual scale another 100X (client GLSL <> server RAPIDS.ai GPU) and improving how analysts understand and collaborate (React, node, RAPIDS GPU). You’ll be working with our full-stack team, partners like Nvidia, and as we are a user-focused team, you’ll also have the chance to chat directly with analysts in our community channels and engage with their data teams. Over time, you’ll take ownership of increasing parts of the full stack GPU visualization pipeline and its direction. Global remote friendly, long-term (1yr+), and option of contract vs full-time (equity etc). - Security engineer - AI code sandbox hardening We’re looking for a security engineer (any time zone) to design, implement, test, and harden the AI code sandbox louie.ai uses to secure untrusted code execution . You will collaborate with our architects and developers as we prepare the surrounding application for third-party security auditing and pen testing. You should have some familiarity with Linux and container security practices and tools such as libseccomp policies, strace, iptables, and container networking. Ideally you have worked on sandbox and jail breaking technology before from a attacker/defender side, and OS/network/container/VM isolation mechanisms in general. You must be _very_ comfortable with Python + Docker. This is a 2-4w initial project. Global/remote fine, with key meetings on PDT (US) time zones.

Similar Jobs

Create your own personalized Job Alert