Flesh out designs and contribute to functional and non-functional requirement with definite consideration
clusters, Cloud security, mail and domain protection mechanisms such as DMARC, SPF, DKIM, PKI and Certificate
effectively convey complex security concepts to non-technical stakeholders Strong leadership and team
report technology and information security risk with non-technology and executive business stakeholders Ability
other security tools Knowledge on log collection mechanism such as Syslog, Log file, DB API Knowledge in
landscape for services that can be reused Analyse Non-Functional Requirements and include in technical