external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders qualification. 5 years Experience in programming languages C#. Experience with windows desktops and server support as a C# Developer. Solid experience with developing rest APIs using C# and .Net. Deploying secure Azure
needed, with accuracy and in compliance with our security requirements. Provide service delivery in a timely experience required: 5 years' experience with MS SQL. Grade 12 (compulsory). IT qualification (Degree/National
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
possible. At least 2 years' worth of experience using C# or similar MS technologies. Experience with Container
Technologies Large-scale high-performance databases Security Patterns AWS Certifications: AWS Certified: Developer SysOps AWS Certified DevOps Pro AWS Certified Security Speciality Essential Skills Requirements: Infrastructure Kafka StepFunctions Snowflake High Performance DB Security Advantageous Skills Requirements: Experience with
solutions, the solution architects as well as the IT security environment. Dev/Ops-Engineer Platform IDPs (m/f/x) relevant documentation in the Product Depot (e.g. security documentation, functional documentation, operations of working Troubleshooting and maintenance IT Security System Monitoring Incident and Request Management
meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
Confluence, Trello) Operations Management IT security best practices and risks Salary Market Related
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders