Security Architect
... areas: Cyber Breach Response, Cloud Security Services, and Proactive Cyber Services. ... to join a team of security consultants investigating computer crimes and ...
... areas: Cyber Breach Response, Cloud Security Services, and Proactive Cyber Services. ... to join a team of security consultants investigating computer crimes and ...
... looking for a IT Security Architect ready to join our ... implementing, and developing IT security architecture, ensuring compliance with regulations ... of experience in IT security, including at least 1 year as a security architect Knowledge of regulations such ...
... are seeking a proactive Cybersecurity Specialist to join our Clients team and help protect their organization’s infrastructure from cyber threats. You will be responsible for implementing and managing security tools, monitoring networks, and responding ...
... automate migration tasks and processes. Security: Knowledge of security best practices, including firewalls, encryption, ... an experienced Monitoring Solution Migration Specialist to join our agile, forward- ...
... , constantly looking to increase IAM security, improvements & automation with the aim ... and service levels. Our information security team works in collaboration with ... and personal attention to each specialist Interesting projects with innovative products ...
... managed services for Akamais security products to protect our customers ... internet traffic. As a Security Architect, you will be responsible ... systems to tailor our security solutions and answer customers security needs Managing and documenting technical ...
... workshops maintaining and enforcing security standards. Apply if you have: ... , container images, and container security, CNI, CSI, as well as ... Administrator (CKA) Certified Kubernetes Security Specialist (CKS) Certified Kubernetes Application Developer ( ...
... a key role in improving security, automation, and identity governance. As ... across Engineering, Customer Success, and Security to optimize IAM policies, automate ... flows. Align IAM policies with security frameworks (e.g., NIST) and ...
... manage CI CD processes, automating security steps to increase efficiency and scalability Automate security tasks in DevOps processes using ... GitHub Knowledge of web application security (OWASP TOP 10) and secure ...
... ensuring it meets the security needs of our clients. As ... working in the IT security industry creating tools for monitoring ... methodologies. Awareness of IT security issues. Proficiency in German or ... work towards making Fudo Security the best place to work, ...