optimize infrastructure, ensuring scalability, security, and optimal performance. Collaborate with development malfunctions, or outages. Ensure compliance with industry security standards and best practices throughout all infrastructure including virtualization, storage, networking, and security. Proficiency in cloud automation/orchestration Understanding of network protocols, firewalls and network security groups, load balancers, and VPN configurations
optimize infrastructure, ensuring scalability, security, and optimal performance. Collaborate with development malfunctions, or outages. Ensure compliance with industry security standards and best practices throughout all infrastructure including virtualization, storage, networking, and security. Proficiency in cloud automation/orchestration Understanding of network protocols, firewalls and network security groups, load balancers, and VPN configurations
experience in Kubernetes architecture, Networking, Security, Deployment, and Management 3 years Infrastructure technologies experience like SOAP and REST 3 years Web Security protocols experience like OAuth, JWT, OIDC Certified Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS) AWS Associate level certifications
experience in Kubernetes architecture, Networking, Security, Deployment, and Management 3 years Infrastructure technologies experience like SOAP and REST 3 years Web Security protocols experience like OAuth, JWT, OIDC Certified Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS) AWS Associate level certifications
external providers, vendors and customers. Treats security as a first-class citizen. Works closely with stakeholders
and creation. Familiarity with manual testing, security testing, and technical test case creation. Excellent
and Next.js If you are a highly skilled Network Security Specialist looking to make a significant impact
automation. Ensure compliance, data protection, and IT security requirements, and enforce uniform requirements
Control Tools Good understanding of HSM and other Security modules within Switching application. Knowledge
documentation Architecture overviews and diagrams Security policies and procedures System policies and procedures