Windows, UNIX, and Linux operating systems Web Application Security & Encryption Strong organizational skills
systems, such as Git. Knowledge of mobile application security and performance optimization techniques
row-level security on data and understanding application security layer models in Power BI. Proficient in row-level security on data and understanding application security layer models in Power BI. Proficient in
Responsibilities: Perform IT General Control, Application Control, and IT Security reviews, along with business process audits, IT general controls, application controls reviews, and Cyber Security audits. Qualifications: B
secure web applications. Utilize Spring modules like Spring MVC, Spring Data, and Spring Security. Technical
high-availability, and performant applications Implementation of security and data protection Reference Number
high-availability, and performant applications Implementation of security and data protection Reference Number
internal servers, networks, and applications to identify and resolve security flaws. Occasional experiments
Assist students with the online application process during interviews, securing applications on the spot. •
Assist students with the online application process during interviews, securing applications on the spot. •