please consider your application unsuccessful. Only online applications will be considered. You will be directed Personal Information for the purposes of potentially securing employment. As an applicant you agree to make information required for the purpose of potentially securing employment and you understand and agree that should
please consider your application unsuccessful. Only online applications will be considered. You will be directed Personal Information for the purposes of potentially securing employment. As an applicant you agree to make information required for the purpose of potentially securing employment and you understand and agree that should
as code using Terraform. Implement and manage security controls for our cloud infrastructure. Monitor infrastructure up to date and secure, performing updates and security patches. (i.e. Kubernetes, ingress developed, tested, and deployed for customer functions securely, quickly, and scalable. You will evaluate different Terraform for infrastructure as code Experience with security best practices for cloud infrastructure. Experience
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
Collaborate with the Cyber Security team to develop and maintain security and permissions in all delivered
salary for the 4-month period Incentives APPLY ONLINE NOW Visit our Website for more opportunities: www
work vehicle and job site are kept in a safe and secure manner. Ensure that compliance of all Occupational
testing. Test data management. Manual, Performance, security and load testing. Any additional responsibilities Identification, Creation & Sanitation of Test Data Security and Reliability Testing. Technical Test Case creation
meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
automation. - Ensure compliance, data protection, IT security, and enforce uniform business process requirements