
Search by job, company or skills
Showing 10 jobs
Skills:
Nat, Cisco Asa, Logging, PowerShell, Vpn, Siem, Python, application control, Cisco Firepower, network security fundamentals, Troubleshooting, Palo Alto Networks firewalls
Skills:
DevSecOps, Application Security, PowerShell, Bash, Coverity, Python, Azure Cloud Security, Polaris, Wiz, BlackDuck, Jfrog Xray
Skills:
DAST, Cloud Security, Vulnerability Assessment, Penetration Testing, Gcp, Docker, Ids, Siem, Azure, Kubernetes, AWS, Threat Modelling, scanners, Secure Coding Practices, EDR, SAST
Skills:
red teaming , Node.js, Automation, Application Security, Oscp, Python, Offensive Security, OSCE, Adversary Simulation, Go, Manual Code Review, GXPN, AWS Security Architecture
Skills:
Endpoint Security, Vpns, Firewalls, Cloud Technologies, web security gateways, user identity and device management architecture, network access controls, zero-trust security framework, perimeter security, Packet Analyzers
Skills:
secure sdlc , Cloud networking, Vpc, Encryption, Firewalls, routing, Kms, DevSecOps, Terraform, AWS IAM, VNet, AI-enabled tools, secrets management, Key Vault, Security Hub, Network Security Groups, key lifecycle, Defender for Cloud, Azure IAM, Zero Trust security principles, GuardDuty, Azure Security Center, logging monitoring and detection tools
Skills:
Cloud Network Security, GCP Security Expertise
Skills:
Identity Governance Administration, Role Oriented Access Management, IAM technology, Audit Risk Controls, Technology Security Controls, Security Risk Identity Access Management
Skills:
product security , Veracode, PowerShell, Bash, Burp Suite, Gcp, Application Security, Sonarqube, Owasp Top 10, Azure, Python, AWS, ZAP, GitLab Security, Kubernetes security, Check Marx
Skills:
Gdpr, Vpns, Hipaa, Ccna, Firewalls, Iso 27001, Penetration Testing, cloud security, network security, Vulnerability Testing, IT security protocols, Unified Communications, collaboration platforms, AVIT systems, DisplayPort, HDBaseT, remote access solutions, AV protocols, Cissp, intrusion detection systems, IP-based AV systems, access control mechanisms, hybrid infrastructure, Security Assessments, HDMI
