Database security knowledge. Knowledge about cloud technologies. Familiarity with security auditing frameworks
authorization mechanisms using JWT and OAuth 2.0 for secure user access.
Qualifications Requi
configurations, and best practices. Security and Compliance: Ensure security measures and compliance standards
and best practices. Implement and follow data security and privacy policies. Participating proactively
and performant applications Implementation of security and data protection Reference Number for this
performant applications
Reference
adherence. Ensuring that applications are compliant, secure, and operational, using tools such as CMDB, Active
applications within AWS CloudWatch. Applying cloud-security patterns and concepts to the solutions and deployments
Teamwork and communication skills Knowledge in IT security Knowledge in ITIL processes Any additional responsibilities
complex user requests (e.g. low-code configuration) Security patching, vulnerability remediation Log and Implement