Robert Polasek, Developer in Toronto, ON, Canada
Robert is available for hire
Hire Robert

Robert Polasek

Verified Expert  in Engineering

DevOps Engineer and Developer

Location
Toronto, ON, Canada
Toptal Member Since
July 3, 2018

Robert是一名高级基础设施和DevOps工程师,在Unix/Linux系统管理方面拥有超过20年的经验, server automation, programming, development, storage area networks, networking, and security. 此外,在过去的七年中,他一直担任SAN管理员. Robert非常专业,他加入了Toptal,与他的杰出人才一起从事创新项目.

Portfolio

蓝河技术-计算机视觉和机器学习
亚马逊网络服务(AWS)、Terraform、DevOps、AWS云架构...
Helpful Human
gRPC, Kubernetes, Containers, Istio, Prometheus, Grafana, Debugging...
Softchoice
Terraform、Azure、ARM、网络、持续集成(CI)...

Experience

Availability

Part-time

Preferred Environment

Amazon Web Services (AWS), Kubernetes, Docker, Linux, Containers, OpenShift, Azure, Google Cloud Platform (GCP), Helm, Terraform

The most amazing...

...我开发了一个定制的Kubernetes控制器,用于Kubernetes服务和Cloudflare API之间的交互.

Work Experience

AWS DevOps - Cloud Infra

2022 - 2023
蓝河技术-计算机视觉和机器学习
  • 使用IaaC优先方法管理AWS云中的资源. 企业环境由专用的CI/CD和应用程序环境组成, all of the set up in separate AWS accounts, 确保CI/CD和应用程序帐户之间的分离.
  • Set up cross-account IAM roles and policies, created and updated AWS resources such as EKS, ECS, Kinesis, Fargate, Lambda functions, Transit gateways, IAM roles and policies, Athena, and others.
  • Upgraded EKS clusters from version 1.18 to 1.21 without disruption of service. 对将受到部署影响的容器进行分析. 托管的EKS集群节点池,具有用于机器学习作业的多类型CPU/GPU实例.
  • Upgraded all CI/CD pipelines' Terraform version to 1.2.4, updated states outside of CI/CD, 并执行将作业返回到自动化CI/CD管道所需的状态文件操作.
  • 将MySQL的RDS实例更新到版本8,并执行相关的状态操作.
  • 构建和更新用于内部应用程序以及外部舵图的舵图. Managed Kustomize code used by Kubeflow.
  • 为Databricks生态系统创建了完整的Terraform/Terragrunt IaaC代码. 代码被划分为单独的模块,这些模块由Terragrunt在Databricks帐户或工作空间级别上部署. Debugged notebook problems in Databricks.
  • 构建Jenkins管道来构建和部署一个内部应用程序. 在使用DockerInDocker时,利用Kaniko等技术来避免安全问题. 遵循最佳行业实践,如工件提升、不变性和版本控制.
  • 使用可重用的管道代码块,将CI/CD管道从Jenkins迁移到GitHub操作.
  • 对挂起或意外失败的Kubeflow作业执行故障排除,并与用户一起进行修复. 通过为一个用Python编写的关键内部应用程序扩展应用程序API,引入了API键轮换.
Technologies: 亚马逊网络服务(AWS)、Terraform、DevOps、AWS云架构, Kubernetes, Docker, Python, Azure Databricks, Terragrunt, AWS DevOps, Node.js, Continuous Integration (CI), Cloud Architecture, Git, Kustomize, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), AWS Fargate, AWS Lambda, Amazon RDS, VPN, Load Balancers, Bash, Amazon Virtual Private Cloud (VPC), GPU Computing, Ubuntu

Devops Consultant

2022 - 2023
Helpful Human
  • 解决在Digital Ocean中运行的生产Kubernetes集群中应用程序容器的内存不足(OOM)问题. 对生产环境中的应用程序中断进行深入的根本原因分析.
  • 为Prometheus创建了自定义指标,以显示在调用OOM killer时Linux内核所使用的完全相同的指标.
  • Traced gRPC application calls using Wireshark. 设置临时调试容器以从所有应用程序容器收集TCP转储. 试图使用收集的数据在所有应用层之间重新创建gRPC调用.
  • 故障排除和升级系统级应用程序及其各自的舵图- Istio, ingress controller, external DNS, and certificate manager.
Technologies: gRPC, Kubernetes, Containers, Istio, Prometheus, Grafana, Debugging, Continuous Integration (CI), Cloud Architecture, Git, Infrastructure as Code (IaC), VPN, Load Balancers, Bash, Amazon Virtual Private Cloud (VPC), Ubuntu

Devops Consultant

2021 - 2022
Softchoice
  • 为Azure云中的资源构建了Terraform代码和Arm模板.
  • 为客户进行建筑设计,并向他们传授最佳实践. 配置客户端数据中心和Azure之间的网络链接,配置着陆区和网络安全.
  • Worked on an internal project, "Documentation as a code,使用从云部署收集的信息创建项目文档. 将部署从虚拟机迁移到容器.
Technologies: Terraform、Azure、ARM、网络、持续集成(CI), Cloud Architecture, Azure Functions, Git, Infrastructure as Code (IaC), Bash, Ubuntu

Devops Consultant

2020 - 2021
St. Jude Children's Research Hospital
  • 使用Terragrunt/Terraform开发IaaC,同时采用完全模块化的方法并保持代码DRY. 部署了Terraform操作符,用于集成部署不属于Kubernetes的应用程序组件. Modified operator code.
  • 设计并部署了一个带有ModSecurity WAF模块的Nginx入口控制器. 创建自动化收集数据,更新来自互联网供应商的黑名单,并将其应用于运行配置. Used Reloader to perform the rolling update.
  • Developed an Azure Node.通过Fluentd将Kubernetes控制平面日志传输到Splunk,同时添加额外的信息和标签.
  • 使用Tekton管道开发CI/CD管道,同时使用Lighthouse作为GitHub web钩子和git聊天操作符. 扩展了Lighthouse代码,以利用Kustomize来提供和定制源代码版本化的管道.
  • 使用OAuth2-proxy对Kubernetes内部运行的服务实现OAuth2认证和授权.
  • Developed a Cloudflare controller, 它维护了Cloudflare和Kubernetes集群之间基于入口资源注释的Argo隧道配置.
  • 在Splunk中开发了一个管理Kubernetes和Azure资源的中央操作仪表板.
  • 开发舵图单元测试,同时利用测试挂钩进行自动化舵部署测试.
  • Built and maintained CI/CD pipelines using GitHub actions. 已部署的Keel操作员作为CD从GitHub部署到Kubernetes的工具.
  • 根据DevOps最佳实践,使用giitops控制的管道为容器构建和部署构建了JenkinsX CI/CD管道.
Technologies: Kubernetes, Helm, Terraform, Go, Azure, Amazon Web Services (AWS), Terragrunt, Web Application Firewall (WAF), GitHub API, Jenkins, Argo CD, Azure Kubernetes Service (AKS), OAuth 2, DevOps, PostgreSQL, Cloud, GitHub, Networks, Autoscaling, HTML, Infrastructure, Containerization, Networking, Database Management, Monitoring, Cloudflare, Continuous Integration (CI), Cloud Architecture, Azure Functions, Git, DevSecOps, Kustomize, Infrastructure as Code (IaC), AWS Fargate, AWS Lambda, Amazon RDS, Redis, Load Balancers, Bash, Amazon Virtual Private Cloud (VPC), GPU Computing, Ubuntu

DevOps Consultant

2020 - 2020
Rhithm, Inc.
  • 使用Terragrunt和Terraform开发基础架构代码,同时采用完全模块化的方法. Built networking infrastructure, EKS (Kubernetes) clusters, and relational databases in AWS as a code.
  • 在遵循12因素应用原则的同时,使用Helmfile作为部署Helm charts发行版的声明性配置,开发和部署Helm charts到Kubernetes.
  • Containerized the application. Deployed infrastructure containers as an external DNS, 使用cert-manager和Ingress Controller自动进行DNS名称注册, 并创建了自动SSL证书配置,并将它们分配给外部端点.
  • 使用JMeter使用不同的场景对应用程序进行负载测试, 确保它满足多个并发用户执行各种工作流的需求. Worked with developers to identify and address bottlenecks.
  • 使用GitOps构建控制的无服务器Jenkins X开发CI/CD管道. Deployed in Cloud Native.
Technologies: GitLab CI/CD, Apache JMeter, Helm, AWS Cloud Computing Services, Terraform, Terragrunt, PostgreSQL, Cloud, AWS Certificate Manager, GitHub, Networks, Amazon Elastic Container Service (Amazon ECS), Infrastructure, Containerization, Continuous Integration (CI), Infrastructure as Code (IaC), Load Balancers, Bash, Amazon Virtual Private Cloud (VPC)

DevOps Consultant

2020 - 2020
Stainless AI
  • 使用Terraform将第三方模块与特定于客户端的代码相结合,将基础设施开发为代码. Deployed the infrastructure in the Amazon cloud, debugged all issues, and wrote the deployment documentation.
  • 开发了一个Python脚本来自动化输入值文件的构建和Terraform模块以及工作空间的初始化.
  • 创建本地Minikube环境,通过本地动态DNS服务器模拟AWS云环境.
  • Used MetalLB as the load balancer, an external DNS for DNS record updates, 以及用于自动配置SSL证书的cert-manager,以将Helm chart部署到云和本地.
  • 构建了用于部署Kubernetes服务的Helm图表,作为EFS持久卷提供程序, Ingress Controller, external DNS, 以及用于JupyterHub和与JupyterHub互连的特定于客户端的服务的图表.
  • 部署了一个证书管理器,配置了用于DNS域的Let's Encrypt SSL证书及其持续管理.
Technologies: CI/CD Pipelines, Python, Amazon Web Services (AWS), DNS, Amazon EKS, Helm, Terraform, Cloud, AWS Certificate Manager, GitHub, Networks, PostgreSQL, Infrastructure, Containerization, Networking, Continuous Integration (CI), Infrastructure as Code (IaC), VPN, Load Balancers, Bash

DevOps Consultant

2019 - 2020
Helpful Human
  • 为Kubernetes基础设施构建开发Terraform代码. Managed it using Kops for Kubernetes. 调试问题并将Kubernetes与ECR和Amazon Route 53集成.
  • 设计了一个Helm图表,并使用Golang创建了一个内部构建的应用程序. Debugged and troubleshot gRPC.
  • 为Amazon Route 53中的动态DNS名称在Kubernetes内部的基础设施服务开发Helm图表. 根据需要为入口端点创建SSL证书,并为EFS和入口控制器创建持久卷控制器.
  • 使用giitops控制的管道为容器构建和部署构建了Jenkins X CI/CD管道.
  • 安装Istio和升级到最新版本.
Technologies: Amazon Web Services (AWS), Jenkins, OpenVPN, AWS Certificate Manager, Amazon EKS, Terraform, Istio, PostgreSQL, Cloud, GitHub, Networks, Autoscaling, Infrastructure, Containerization, Networking, Continuous Integration (CI), Git, Infrastructure as Code (IaC), Bash

DevOps Consultant

2018 - 2020
International Financial Data Services (IFDS)
  • 设计、安装和解决RedHat OpenShift集群的故障,从版本3迁移.4 to 3.11.
  • 创建动态Jenkins CI/CD管道,将所有主节点和工作节点作为OpenShift集群中的容器运行,其中每个阶段都由自己的参数化docker映像表示,用于特定目的.
  • 设计并安装Hashicorp保险库进行秘密管理. 运行应用程序所需的秘密在容器启动时从保险库中检索,并在应用程序的生命周期中自动更新.
  • 为JBoss集群(Wildfly)开发了健康检查活跃度和准备度探测器,以便在节点托管pod处于内存压力或高负载下时自动执行OpenShift纠正操作, tested probes by introducing network failures.
  • 在RedHat OpenShift版本3中调试了舵机代码-识别安全上下文约束部署的问题.4.
  • 在启动时使用内置配置初始化构建Docker映像, 使用Groovy脚本的EGM Nexus docker映像,在第一次启动时完全初始化配置,并在随后启动同一容器时保留配置.
  • 部署了一个Helm API,作为第三方应用程序部署Helm图的手段. Expanded Heketi Go code that handles volume deletion, deleting volume snapshots prior to the volume itself.
  • 实现了带有动态DNS的MetalLB,作为裸机上负载平衡器的自动配置解决方案.
  • 实现了Helm部署分析,在大型部署期间识别系统瓶颈. 通过识别裸机上的性能瓶颈,调试和分析OpenShift性能.
  • 创建了一个Helm部署图,用于在Minishift中自动配置存储. 使用基于存储类的配置,使用Heketi安装和配置自动化Gluster配置程序.
Technologies: CI/CD Pipelines, Red Hat OpenShift, SonarQube, Docker, JBoss, Vault, HashiCorp, GlusterFS, Nexus, Helm, OpenShift, DevOps, Java, Networks, PostgreSQL, Infrastructure, Containerization, Networking, Ansible, Database Management, Continuous Integration (CI), Git, GitLab, Infrastructure as Code (IaC), Load Balancers, Bash

DevOps Consultant

2019 - 2019
2DA Analytics
  • 使用模块化方法的Terraform将基础设施开发为代码, deployed infrastructure in Amazon cloud, 将本地资源迁移到云中,并调试云中所有迁移问题.
  • 为OpenVPN AMI构建Hashicorp封装代码,并针对AWS账户进行用户身份验证.
  • 为在本地运行的应用程序的容器化版本开发Helm图表, deployed it to EKS Kubernetes.
  • 将OpenVPN部署到使用企业中央认证的自助ca认证机构的EKS中.
  • 部署了一个证书管理器,配置了用于DNS域的Let's Encrypt SSL证书及其持续管理.
Technologies: Amazon Web Services (AWS), Packer, HashiCorp, DNS, OpenVPN, Amazon EKS, Terraform, Cloud, Networks, MySQL, PostgreSQL, Infrastructure, Containerization, Continuous Integration (CI), Git, Bash

DevOps Consultant

2019 - 2019
Spark
  • 为所有容器化环境开发Grafana仪表板,目的是让仪表板随环境动态扩展,而无需更改任何仪表板代码. Used templated dashboards as well as boom table panels.
  • Wrote customized Prometheus queries to retrieve data. Made changes to Prometheus collectors and filters, ensuring all relevant data are passed into Grafana.
  • 处理Rancher服务的创建、服务的部署和问题的故障排除.
  • 修改了Docker镜像,允许通过Prometheus查看主机级磁盘设备并收集它们的指标.
Technologies: Rancher, Prometheus, Grafana, Cloud, GitHub, Kibana, Infrastructure, Monitoring, Continuous Integration (CI), Bash

DevOps Engineer

2016 - 2018
Stagwell Technologies
  • Built, deployed, 并管理了八个大型Kubernetes集群进行开发, user acceptance testing (UAT), 以及每个集群有25个节点和基于负载的水平自动伸缩的生产环境.
  • 使用Groovy实现Jenkins作为持续交付工具, DSL, pipelines, and Kubernetes running Jenkins slaves on demand.
  • 使用Terraform: EC2配置AWS和Azure服务和资源, EBS, S3, VPC, Auto Scaling, Cloud Formation, Elastic Load Balancing, RDS, Route 53, Memcache, Redis, OpsWorks, CloudWatch, CloudTrail, Identity and Access Management (IAM).
  • 使用Terraform: SQS配置AWS和Azure服务和资源, Redshift, Lambda Functions, Beanstalk, Batch, Elastic Container Service, Fargate, and Firehose.
  • 将VMware服务器迁移到AWS和Azure Cloud,使用VMware OVF和Hypervisor VHD映像.
  • 使用OpsWorks框架设计Chef烹饪书来管理配置和自动化安装过程.
  • 在GCP上构建资源,以利用平台的机器学习功能.
  • 使用Elasticsearch作为存储引擎,在Kibana服务器上部署集中日志.
  • 使用OpenID配置Gluu IAM服务器作为Kubernetes的用户认证网关.
  • Built a NeoDB database for all the resources in AWS, all the repositories in GitHub, all jobs in Jenkins, 以及Kubernetes中的所有容器以及它们之间的关系,使用墨卡托代码作为框架进行持续更新.
Technologies: GitLab CI/CD, Python, Google Cloud Platform (GCP), Amazon Web Services (AWS), OpenID, Chef, Azure, Packer, HashiCorp, Vault, Elasticsearch, Jenkins, Hortonworks Data Platform (HDP), Hadoop, Helm, Kubernetes Operations (kOps), Terraform, Kubernetes, Docker, Linux, DevOps, PostgreSQL, Cloud, MySQL, Cassandra, GitHub, Networks, Groovy Scripting, Kibana, Autoscaling, HTML, Google Kubernetes Engine (GKE), C, Infrastructure, Containerization, Networking, Ansible, Database Management, Monitoring, Node.js, Google Compute Engine (GCE), Infrastructure as Code (IaC), Apache Kafka, AWS Fargate, AWS Lambda, Amazon RDS, VPN, Redis, Load Balancers, Amazon Virtual Private Cloud (VPC)

DevOps Engineer

2017 - 2017
TD Bank
  • 开发TOSCA蓝图,并将其部署到OpenStack.
  • 在Groovy中构建Jenkins CI/CD管道,通过REST API自动发布代码和更新Confluence页面.
  • 编写Python脚本与api交互以实现自动部署.
  • Created a JBoss blueprint; also installed, configured and troubleshot JBoss.
Technologies: GitLab CI/CD, Python, Groovy, JBoss, Jenkins, Blueprint, OpenStack, DevOps, Java, Networks, Infrastructure, Containerization, Networking, Bash

DevOps Consultant | Architect

2014 - 2016
Bank of Montreal
  • Designed, deployed, 并配置了Red Hat Satellite Server 6 (RHS6),并将670台服务器从RHS5迁移到RHS6.
  • 设计并构建了一个Puppet基础架构,用于700多个服务器的配置管理.
  • 利用RHS6和Puppet创建供应流程,并编写支持构建类和事实的代码.
  • 托管Solaris和Red Hat企业服务器(超过700台服务器).
  • 在系统库调用级别执行困难的根本原因分析和调试问题.
Technologies: Red Hat OpenShift, JBoss, WebSphere, VMware, Red Hat Satellite, Red Hat Linux, Puppet, Java, Oracle, Networks, Networking, Monitoring, Site Reliability Engineering (SRE), Bash

Senior Consultant

2011 - 2013
Resmor Trust (Royal Bank of Canada)
  • Managed RHEL Linux servers, Hitachi modular storage, Hitachi Virtual Storage Platform (VSP), Brocade FC switches, VMware ESX servers, and F5 load balancers.
  • 设计、安装和配置日立AMS 2300和相关的SAN组件.
  • 为PXE引导的自动化Linux构建构建了一个Kickstart服务器.
  • 设计并实现了将Oracle RAC集群封装为Linux HA集群,确保所有Oracle故障转移组件和ETL应用程序的高可用性.
  • Migrated Oracle RAC 11G to a new Hitachi storage frame.
Technologies: CFEngine, Hitachi HPLC, VMware, Red Hat Linux, Networks, Infrastructure, Networking, Database Management, Monitoring, Bash

Senior Unix, SAN Consultant

2009 - 2011
Intria Items | CIBC
  • 管理Solaris、HP-UX、AIX和Linux服务器(超过200台服务器).
  • 计划并执行从蒙特利尔到Markham的物理存储迁移(25tb),停机时间最短.
  • 使用虚拟化技术作为ldom进行应用程序设计和实现, Solaris zones, and HP VMware.
  • 管理和实施集群技术的改进,如HP ServiceGuard和Veritas集群服务器.
Technologies: VMware, LDoms, SAN Switches, SAN Brocade, IBM SAN, Storage, Linux, HP-UX, AIX, Solaris, Perl, Oracle, Veritas Cluster Server, Networks, Infrastructure, Networking, Monitoring, Bash

Cloudflare Controller for Kubernetes

I developed a Cloudflare controller, 它维护了Cloudflare和Kubernetes集群之间基于入口资源注释的Argo隧道配置. 开发背后的动机是确保将应用程序配置到Kubernetes的完全自动化过程. Without the controller, every time a new application was provisioned, 需要有人在Cloudflare中手动启用一个新的应用程序. This was very useful for CI/CD pipeline previews, 哪一种可以每天生成几次新应用程序,并允许开发人员立即看到更改. 控制器是用Go语言编写的,并作为舵机图部署.

Streamlined Application Deployment to Kubernetes

我设计并实现了Kubernetes的流线型应用程序部署, 使用Terraform操作符和Terraform代码作为部署的一部分自动部署任何外部云资源依赖. Helm chart deployed workspace CRDs into Kubernetes, 这些数据被运营商收集起来,并在云API上执行. Once completed, 输出被带回到Kubernetes,供应用程序本身用于配置.

一个使用Kubernetes容器作为slave的Jenkins自动化作业创建框架

I designed, coded, 并使用Groovy维护了一个Jenkins作业创建框架, DSL, and Jenkins pipelines. 该框架允许轻松配置和部署新作业,以及快速批量更改现有作业. The pipeline incorporated the Hashicorp vault as central, secure storage for Jenkins configuration and job builds. Kubernetes containers were used as slaves for builds. 构建过程的每一步都被定义为一个Docker映像, 允许我们使用不同的工具轻松地在相同的源代码上构建,或者确保在产品的生命周期中版本保持不变.

Languages

Bash, Java, Perl, C, Python, Groovy, HTML, Go

Libraries/APIs

Terragrunt, Jenkins Job DSL, OpenID, GitHub API, Node.js

Tools

Helm, Amazon EKS, Terraform, Chef, Puppet, Jenkins, Veritas Cluster Server, Amazon Elastic Container Service (Amazon ECS), GitLab CI/CD, Google Kubernetes Engine (GKE), Azure Kubernetes Service (AKS), AWS Fargate, VPN, Amazon Virtual Private Cloud (VPC), GitHub, Vault, OpenVPN, Kibana, Grafana, VMware, Google Compute Engine (GCE), Git, HashiCorp, Packer, Red Hat Satellite, Hitachi HPLC, SonarQube, Apache JMeter, Istio, Ansible, GitLab

Paradigms

DevOps,持续集成,DevSecOps, Azure DevOps,微服务

Platforms

Docker, Linux, Kubernetes, Solaris, HP-UX, Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), AWS Lambda, Ubuntu, Red Hat Linux, OpenShift, Oracle, Red Hat OpenShift, Azure Functions, Hortonworks Data Platform (HDP), WebSphere, JBoss, OpenStack, Rancher, Nexus, AWS Cloud Computing Services, AIX, Apache Kafka, DigitalOcean

Other

DNS, CI/CD Pipelines, Kubernetes Operations (kOps), Autoscaling, Containers, Infrastructure, Containerization, Infrastructure as Code (IaC), Amazon RDS, AWS DevOps, Site Reliability Engineering (SRE), Load Balancers, Cloud, Networks, Groovy Scripting, Networking, Monitoring, Cloudflare, Cloud Architecture, Kustomize, GPU Computing, Storage, IBM SAN, SAN Brocade, SAN Switches, LDoms, Prometheus, AWS Certificate Manager, Web Application Firewall (WAF), Argo CD, ARM, Debugging, AWS Cloud Architecture, Azure Databricks, Electronics, Computer, Architecture

Frameworks

Hadoop, CFEngine, Blueprint, OAuth 2, gRPC

Storage

MySQL, PostgreSQL,数据库管理,Redis, GlusterFS, Cassandra, Elasticsearch, Datadog

1989 - 1994

Master's Degree in Computers and Electronics

布尔诺理工大学计算机与电子系-捷克共和国布尔诺

JANUARY 2022 - PRESENT

Certified Kubernetes Security Specialist

Cloud Native Computing Foundation

JANUARY 2022 - PRESENT

Certified Kubernetes Administrator

Cloud Native Computing Foundation

JANUARY 2012 - PRESENT

Hitachi Data Systems Certified Professional

Hitachi

JANUARY 2008 - PRESENT

Sun Solaris 10 Certified System Administrator

Sun Microsystems

JANUARY 2004 - PRESENT

Oracle Certified Professional

Oracle

JANUARY 2004 - PRESENT

Sun Solaris 9 Certified System Administrator

Sun Microsystems

JANUARY 2003 - PRESENT

HP-UX 11 Certified System Administrator

Hewlett-Packard

JANUARY 1999 - PRESENT

Check Point Firewall I Administrator

Check Point

JANUARY 1998 - PRESENT

HP-UX 10.20 Certified System Administrator

Hewlett-Packard

Collaboration That Works

How to Work with Toptal

在数小时内,而不是数周或数月,我们的网络将为您直接匹配全球行业专家.

1

Share your needs

在与Toptal领域专家的电话中讨论您的需求并细化您的范围.
2

Choose your talent

在24小时内获得专业匹配人才的简短列表,以进行审查,面试和选择.
3

Start your risk-free talent trial

与你选择的人才一起工作,试用最多两周. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring