Senior Full-Stack Developer
We are a UK-based cyber security training and career development platform established in 1999. We have over 500,000 students in 195 countries. We empower the next generation of cyber security professionals to reach their highest career potential.
We are committed to ensuring student success by providing a supportive, innovative learning environment and access to the latest industry knowledge.
The work will start off as fixed-price projects but bid your hourly rate as the roll could move to full-time if you are the right fit.
- API programming
- OpenAI/ChatGPT (knowledge of)
- WordPress plugin development
- Google sheets
- Must be fluent in English, both spoken and written.
- Ability to attend voice meetings over Zoom
- Work on Slack for messaging
- Experience with Google Drive, Google Sheets, and Google Docs.
- Fully remote working
- We work UK hours roughly 4 am – 3 pm (Flexible based on deliverables).
- Attention to detail
QUALIFICATIONS & WORK EXPERIENCE
- Bachelor’s degree in computer science, engineering, or an equivalent
- 3-5 years of experience in software engineering
- Proven experience as a Full Stack Developer or similar role
INTERVIEW & SELECTION
- You will be asked to produce a 5-minute proposal for an app for the first interview.
- Please do not message us on Linkedin, social media, or email. Only message us here or You will be removed from consideration.
WATCH THIS VIDEO
REQUEST FOR PROPOSAL (RFP)
To be considered for this role you are being asked to submit a proposal based on this RFP.
AI Q&A assistant with StationX Custom Dataset
Students at StationX uses a custom community tool https://circle.so/ for asking questions and receiving answers.
We wish to use AI to assist in answering those questions.
When a student asks a question, we want AI to have a suggested answer based on the common dataset and our own custom dataset.
Example questions and answers.
Question: What courses do you have on CISM?
Answer: Courses related to CISM can be found here; https://xxx
Question: Do hacking tools allow a phone to be hacked if you only know someone’s phone number? How can phone users defend against this?
Answer: It is generally not possible to hack into a phone simply by knowing the phone’s number. In order to hack into a phone, an attacker would typically need to have access to additional information and resources, such as the phone’s operating system and firmware, as well as the knowledge and skills to exploit vulnerabilities in these systems.
That being said, there are some limited scenarios in which an attacker might be able to gain access to a phone by knowing its number. For example, an attacker might be able to exploit vulnerabilities in the phone’s messaging or voice call functions to intercept calls or messages, or to send malicious messages or calls to the phone. In these cases, the attacker would typically need to have access to the phone network or to a device that is connected to the phone network in order to carry out the attack.
Overall, it is important to be cautious about the information that you share online and to protect your phone with strong passwords, security software, and other security measures to help prevent unauthorized access.
An app needs to be developed for AI to assist in answering questions.
Information the app might need
|Name||Location of data||Example Data|
|Date||Circle||1st July 1990|
|Assignee||Dropdown of Assignees||Nathan|
|URL of question/post||Circle||https:\\xxx.com|
|Student name||Circle||Bob Smith|
|Question||Circle||What courses do you have on CISM?|
|Previous comments in thread||Circle||Blank|
|Question to submit to AI||Circle and manual edit||What courses do you have on CISM? Provide the pros and cons to CISM|
|Submit to AI [Button]||Button||Button|
|AI answer||OpenAI custom dataset||Courses related to CISM can be found here; https://xxx|
The pros and cons are..
|Answer to be sent||OpenAI and manual edit||Courses related to CISM can be found here; https://xxx|
The pros and cons are..
|Submit to community [Button]||Button||Button|
Click the link below and follow the guidelines to ensure your proposal is successful.