Headquartered in Palo Alto (California), C Ahead Technologies is an innovative brainchild of its founders Outsourcing in an effective manner to its clients. C Ahead is globally recognized for its core value in upside to find stalwarts of talent to be part of C Ahead's growth story. Global Footprint: Palo Alto
Headquartered in Palo Alto (California), C Ahead Technologies is an innovative brainchild of its founders Outsourcing in an effective manner to its clients. C Ahead is globally recognized for its core value in upside to find stalwarts of talent to be part of C Ahead's growth story. Global Footprint: Palo Alto
our clients' security postures. - Assist in the development and implementation of security measures to assessments and penetration testing. - Analyze security breaches to identify the root cause and implement development of security policies, procedures, and guidelines. - Assist in the creation of security awareness - Knowledge of security frameworks and standards - Familiarity with various security tools and technologies
of user and risk impact. Use a wide spectrum of security and technical expertise to contribute to the modernisation IT-related functions 5 years in Design, experience in Security Domain required. TOGAF Certification, ITIL (Information (Information Technology Infrastructure Library) Security Domain-related certifications preferable. End-to-end Concepts and Architecture Systems Analysis and Design Security Concepts Cloud infrastructure and DevOps deployments Configuration Engineering Lead, IAM Solutions, Security, Cyber security, TOGAF, ITIL, Linux, Wintel, Java, Javascript
Mathematics minimum symbol C (Not Maths Literacy) English minimum symbol C Desired Experience: We are
the table. You should have proven experience with C# .Net (Core & Classic) & frameworks as well sessions; we're all architects. Proven experience with C# .Net (Core & Classic) & frameworks Proficiency
experience and product knowledge Experience in Objective-C is beneficial Experience in Java or Kotlin Have worked Knowledge of event programming Knowledge of BLoC Secure development practices Zero trust Tools XCode Android
network base and is highly versed in dealing with C-suite level executives in business. In short, you focused on the entrepreneurial market. Once you have secured the business, a separate team will drive the onboarding
network base and is highly versed in dealing with C-suite level executives in business. In short, you focused on the entrepreneurial market. Once you have secured the business, a separate team will drive the onboarding
and risk impact.