
Search by job, company or skills
Showing 10 jobs
Skills:
security consulting , Application Security, Networking, Endpoint Security, Cryptography, Incident Response, cloud security, Digital Forensics, Vulnerability Management, security analytics, risk management, threat identification, directory services, cloud authentication, access management, business continuity, computer security incident response
Skills:
Networking, Endpoint Security, Cryptography, Threat Identification, Cloud Authentication, Incident Response Protocols and Tools, directory services, Access Management, Business Continuity, Risk Management, Monitoring
Skills:
DAST, Github, Appscan, Nosql, React Js, Automation Tools, Oracle, Angular Js, Python, Java, Data Analytics, Hadoop, Graphql, Node.js, Spring MVC, Web Applications, security reviews, semgrep, CI CD process, SAST, threat modelling, AI ML LLM concepts, secure DevOps, Open-Source Security solutions, security incident troubleshooting, self-healing automated application monitoring, security automation solutions, real time dashboards, SCA, Checkmarx
Skills:
automation, Security Controls, Logging, Incident Response, agent-based techniques, Monitoring, cloud native environments, ZTNA services, CNAPP, Ai
Skills:
Python, Hipaa, Iso 27001, Vpns, Incident Response, AWS, Bash, Kubernetes, Azure, Gcp, Docker, Firewalls, Vulnerability Management, AI integration, SOC 2
Skills:
Azure ML, Databricks, Rest Apis, Machine Learning, AWS, Data Integration, Siem, Python, Azure, Vulnerability Management, SOAR, Ai, SageMaker
Skills:
Firewalls, Ips, Fortinet, Routing, Application Security, Wireless, Zscaler, Cisco Meraki, Vpn, Networking Protocols, UTM, Switching, Arista, SASE, Secure routing methodologies, Network Access Control, Zero Trust architectures, Security hardening, Network segmentation, F5 Load Balancers, Architecture diagrams, Cato, nac
Skills:
Cloud Security, Json
Skills:
API security, Distributed Systems, Scripting, ReBAC, credential governance, policy-as-code, authorization systems, cloud-native security fundamentals, service-to-service authentication patterns, token systems, NHI concepts, centralized authorization services, workload identity, secure secret handling, authentication flows, agent credentials, rbac, service principals, credential rotation, identity authentication, ABAC
Skills:
PowerShell, Intune Autopilot, LAN WAN Wireless VPN, ZSH Bash, Device compliance and security policies, Windows patching and device lifecycle management, TCP IP DHCP DNS, AD GPO Azure AD and cloud authentication, Microsoft Endpoint Management, Hardware specifications and fleet management, OS deployment OSD, conditional access, JAMF MDM, Application packaging and deployment
