AI Career Platform
AI Career Platform
At Sjesora, security is not an afterthought—it is a foundational principle. We understand that you trust us with your most sensitive professional data, and we are committed to protecting it with enterprise-grade security measures, transparent practices, and continuous monitoring.
Our security program is designed to protect the confidentiality, integrity, and availability of your data in accordance with industry best practices.
Sjesora is hosted on Amazon Web Services (AWS), a leading cloud provider with top-tier physical and network security. We leverage AWS's secure data centers which are compliant with SOC 2, ISO 27001, and PCI-DSS standards.
We utilize Virtual Private Clouds (VPC) to isolate our production environment. All network access is restricted via strict Security Groups and Network ACLs. We employ Web Application Firewalls (WAF) to protect against common web exploits.
Our architecture includes automated DDoS protection to ensure high availability and resilience against malicious traffic attacks.
We maintain comprehensive logs of system activities and employ real-time monitoring tools to detect and respond to suspicious behavior immediately.
We employ rigorous encryption standards to protect your data throughout its lifecycle.
All data transmitted between your browser and our servers is encrypted using Transport Layer Security (TLS) 1.2 or higher. We employ strict HSTS policies to ensure secure connections.
All user data stored in our databases and file storage systems is encrypted at rest using industry-standard AES-256 encryption. Key management services manage cryptographic keys securely.
Our multi-tenant architecture logically separates user data to prevent unauthorized cross-tenant access. Strict access controls ensure you only see your own data.
Security is integrated into every step of our development process. We perform code reviews, static analysis, and dependency scanning to identify vulnerabilities before they reach production.
We use secure, industry-standard authentication protocols (OAuth 2.0, JWT). Passwords are never stored in plain text; they are salted and hashed using strong algorithms (e.g., Argon2 or bcrypt).
We regularly scan our systems for vulnerabilities and engage in periodic security assessments. Critical patches and security updates are applied promptly.
We are fully committed to GDPR compliance. We provide tools for you to exercise your rights to access, correct, and delete your data. See our Privacy Policy for more details.
All Sjesora employees undergo background checks and security training. Access to production systems is granted on a principle of least privilege and is regularly reviewed.
We rely on the security community to help us keep Sjesora safe. If you believe you’ve discovered a vulnerability, please report it to us responsibly.
Email: security@sjesora.com
Please include a detailed description of the vulnerability and steps to reproduce it. We will acknowledge your report promptly and work with you to resolve the issue.
Last updated: 3/4/2026