Copyright © 2025
Disclaimer: Hunt UK Visa Sponsors aggregates job listings from publicly available sources, such as search engines, to assist with your job hunting. We do not claim affiliation with KryptoKloud. For the most up-to-date job details, please visit the official website by clicking "Apply Now."
Company Description
KryptoKloud provides advanced cyber security and resilience solutions to customers. Our operational offices are based in the UK, where we offer a suite of Managed Services including Security Monitoring, Incident Response, Compliance, Governance, Audit, and Cyber Insurance solutions.
We are the sole inventors of CyberShadows, a comprehensive Intelligence Detection & Response platform featuring P1 Cyber Attack Detection & Response, Real-time Forensic Data Analytics, Critical Supply Chain Monitoring, and more. KryptoKloud is a 100% British-owned company.
Role Description
This is a full-time, on-site role located in Lincoln for a Full-Stack Developer.
The Full-Stack Developer will be responsible for developing and maintaining both front-end and back-end components of our applications. Day-to-day tasks include collaborating with cross-functional teams to design and implement software solutions, coding, testing, debugging, and ensuring high performance and availability of our software systems.
The Senior Full Stack Security Engineer brings together expert-level software engineering and offensive security acumen.
Ability to design and build secure, high-performance applications, kernel-level agents, and threat hunting tools—while operating with a sophisticated attacker mindset.
This role requires deep proficiency in C++, Python, and JavaScript, with the ability to architect and deliver full-stack applications that support threat intelligence, reverse engineering, and red team operations.
Must haves;
Ability to build secure, scalable internal platforms, dashboards, and APIs using Python, JavaScript/TypeScript, Node.js, and React.
Design full-stack applications for internal users (SOC, Threat Intel, Red Team) to operationalize detection and response workflows.
Automate and visualize threat intelligence, telemetry, and malware analysis output at scale.