Thank you to all applicants,this role has now been filled.

Why work for Spamhaus?

We hire people who are passionate about our purpose and want to work in an organization where they will be stretched and have the opportunity to question and challenge.

Self-motivated individuals looking for a non-corporate environment will enjoy our culture. We have a start-up mentality, where we are extremely hardworking, ideas are welcomed, and team members are required to “get stuck in.” Our teams’ efforts make a difference, and their work really does "move the needle".

Having been established over 25 years ago (same year as Google), Spamhaus is still 100% owned by its founder; we have experience, expertise and stability in a fluid marketplace.

Team:

The Malware team is located across Europe and works closely with our partner abuse.ch and other research teams across the organization. It consists of four team members, including this role, and is supported by a dedicated Sys Admin from the DevOps team.

The team focuses on analyzing malware by deep diving into reverse engineering and malicious code on open source and private data sources. The output from this deeply technical research is added to datasets across abuse.ch and Spamhaus.

The role:

We are looking for a backend development specialist who has a passion for working within a CTI environment. You must be a flexible and confident self-starter who is looking for your next challenge. You will become an integral part of the Malware team, supporting the CTI researchers from both a development and systems administration perspective.

The successful candidate will thrive in a dynamic working environment and be able to rapidly adjust to changing requirements while proactively planning architecture, alongside deploying and monitoring the infrastructure. With knowledge and expertise in the appropriate technologies and tools for this specific environment, you will always be one step ahead of the team’s needs.

Between abuse.ch and Spamhaus, we have access to huge amounts of data and proprietary tools. One of the key focuses of this role, will be to rapidly but carefully evaluate and design the appropriate architecture to unlock further value that the team can utilize.  Additionally, there is a significant amount of existing code and infrastructure that requires maintaining.

Key responsibilities will include:

  • Write production-level code to implement new features, improve performance, and support the scaling of systems.
  • Design and implement microservices, APIs, and backend components to enhance infrastructure and application workflows.
  • Collaboration - working closely with the immediate team to understand their requirements, and with the wider organization to share expertise and support.
  • Conceive, orchestrate, deploy, and support proprietary tools and infrastructure - Propose innovative approaches and utilize emerging technologies to address operational and technical challenges. From conception through to delivery and maintenance, you will be responsible for the full breadth of any project.
  • Build, implement and maintain: 
    • Continuous Integration/Continuous Delivery (CI/CD) tools and deployment procedures.
    • Monitoring and logging processes
    • Code validation
  • Review and improve containerization and orchestration.
  • Ensure security - Build and set up new development tools and infrastructure, ensuring that systems are safe and secure against cybersecurity threats.
 

Technical skills:

  • Proficient in shell scripting, python and golang.
  • Knowledge and experience in utilizing CI/CD tools.
  • Familiar with the concept of distributed systems.
  • Understanding of RBDMS databases (MySQL, Postgres).
  • Comfortable with the development of HTTP APIs and REST.
  • Confident working in a Linux environment.
  • Good understanding of security implications for orchestration and implementation decisions you will make.
  • Experience with major cloud service providers, ideally AWS. 
  • Saltstack or Ansible, with the ability to write your formulas and automate deployments.
  • Skills in monitoring and logging tools (Prometheus, Grafana, ELK stack).
  • Knowledge of containerization and orchestration (Docker, Kubernetes).
  • Excellent interpersonal and teamwork skills including verbal and written communication skills.
  • Able to explain DevOps best practices and concepts, mentoring and teaching those to others.
 

Experience: 

Minimum of 1 year of working within a Cyber Threat Intelligence environment, specifically with teams tracking malware families and threat actors. Additionally, you will need to have 4-5 years working in DevOps, with strong coding skills, having participated in or owned projects (as opposed to only writing scripts for automation).

Benefits:

  • Competitive salary and performance-based bonuses.
  • Opportunity to work in a dynamic and supportive environment.
  • Career growth and development opportunities.
  • Flexible working hours and remote work setup.
 

Location:

European-based. Everyone at Spamhaus works from home; however, global travel is required occasionally for face-to-face meetings and event attendance.

What does Spamhaus do?

Spamhaus, together with its partner abuse.ch, strengthens trust and safety for the Internet. We extract intelligence from globally sourced signals that enable us to provide the community and clients with actionable and timely datasets to provide protection, insight and context to behaviour relating to internet resources.

Having been the market leader in email blocklists (DNSBLs) for the past two decades, we are moving into the broader cyber threat intelligence market to leverage the breadth of signal and actionable intelligence we have relating to activity on the Internet.

How to apply?

Please complete the contact form (https://www.spamhaus.com/#contact-form) and advise you wish to apply for the role of Senior DevOps Engineer, and we'll get the relevant recruitment specialist to reach out to you.