principles Experience with Project, Change and Transition Management and Documentation tools (e.g Jira Confluence, Trello) Operations Management IT security best practices and risks Salary Market Related
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
Technologies Large-scale high-performance databases Security Patterns AWS Certifications: AWS Certified: Developer SysOps AWS Certified DevOps Pro AWS Certified Security Speciality Essential Skills Requirements: Infrastructure Kafka StepFunctions Snowflake High Performance DB Security Advantageous Skills Requirements: Experience with
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders developing rest APIs using C# and .Net. Deploying secure Azure Application services, private endpoints etc
meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
needed, with accuracy and in compliance with our security requirements. Provide service delivery in a timely
team Develop systems solutions in line with IT Security standards and other compliance topics, quality
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders