automation Cloud computing technologies, keeping abreast of business drivers and emerging computing trends Q Technologies Large-scale high-performance databases Security Patterns AWS Certifications: AWS Certified: Developer SysOps AWS Certified DevOps Pro AWS Certified Security Speciality Essential Skills Requirements: Infrastructure Kafka StepFunctions Snowflake High Performance DB Security Advantageous Skills Requirements: Experience with
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders university degree in a relevant field of study (e.g., computer science, engineering, sciences, etc.) or a comparable developing rest APIs using C# and .Net. Deploying secure Azure Application services, private endpoints etc of Unit Testing Development in GITHUB. Cloud computing technologies. Azure Kubernetes Services and Docker
solutions, the solution architects as well as the IT security environment. Dev/Ops-Engineer Platform IDPs (m/f/x) relevant documentation in the Product Depot (e.g. security documentation, functional documentation, operations Qualifications/Experience: Successfully completed degree in computer science/communications engineering or another of working Troubleshooting and maintenance IT Security System Monitoring Incident and Request Management
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
needed, with accuracy and in compliance with our security requirements. Provide service delivery in a timely
Confluence, Trello) Operations Management IT security best practices and risks Salary Market Related
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders university degree in a relevant field of study (e.g., computer science, engineering, sciences, etc.) or a comparable
team Develop systems solutions in line with IT Security standards and other compliance topics, quality
Qualifications/Experience: Relevant degree in Computer Science, Software Engineering, or a related field