
Search by job, company or skills
Showing 9 jobs
Skills:
red teaming , Node.js, Automation, Application Security, Oscp, Python, Offensive Security, OSCE, Adversary Simulation, Go, Manual Code Review, GXPN, AWS Security Architecture
Skills:
DAST, Linux, Siem, AWS, EDR, SAST, nist, SOC 2, MDR, CIS
Skills:
DAST, Tcp, Saml, Vpns, Okta, Docker, Terraform, Sonarqube, Python, AWS, Oauth2, Http, Waf, Kubernetes, GitOps, Wiz, Go, GRPC, SAST, ABAC, Ip, Snyk, TLS 1.3, rbac, ArgoCD, mTLS, OIDC
Skills:
.NET, Java, DAST, Jenkins, Rest Apis, Python, OpenID Connect, CWE Top 25, DevSecOps practices, application API and microservices security, OAuth 2.0, SCA, OWASP Top 10 Web API and LLM Applications, secret scanning tools, SAST, CI CD pipelines, Git-based workflows
Skills:
DAST, Vulnerability Scanning, Cloudformation, PowerShell, Bash, Jenkins, DevSecOps, Terraform, Docker, Ansible, Kubernetes, Python, GitHub Actions, SAST, infrastructure as code
Skills:
Vulnerability Scanning, PowerShell, Bash, Networking, Patch Management, Siem Tools, Gcp, Linux, Azure, scripting Python, cloud platforms AWS, risk prioritization, OS Windows, Qualys VMDR Vulnerability Management Detection Response, remediation tracking, security monitoring solutions, compliance frameworks, security standards
Skills:
snowflake , BigQuery, Cloud Infrastructure, Gcp, Terraform, Shell scripting, Databricks, Splunk, Azure, Kubernetes, Python, AWS, Palo Alto XSOAR, AI tools, SOAR, SIEM Administration, Elastic, Microsoft Sentinel
Skills:
Gdpr, Vpns, Hipaa, Ccna, Firewalls, Iso 27001, Penetration Testing, cloud security, network security, Vulnerability Testing, IT security protocols, Unified Communications, collaboration platforms, AVIT systems, DisplayPort, HDBaseT, remote access solutions, AV protocols, Cissp, intrusion detection systems, IP-based AV systems, access control mechanisms, hybrid infrastructure, Security Assessments, HDMI
Skills:
red teaming , Typescript, Iam, blockchain security, Containers, Penetration Testing, Kubernetes, Python, AWS, MPC, secrets management, AI-powered offensive agents, Go, adversary simulation, offensive security, TSS, security research
