
Search by job, company or skills
Showing 9 jobs

Skills:
Linux, Security Documentation, Windows, Cybersecurity, CVE tracking, security gap analysis, security network system administration
Skills:
Infrastructure automation or configuration management, Working with APIs for platform integrations, Security logging and SIEM platforms, Email security platforms and secure email gateways, Vulnerability management platforms, Operating security tooling in cloud environments
Skills:
red teaming , security automation , DAST, DevSecOps, Threat Hunting, Vulnerability Management, Cloud Security, Threat Intelligence, Incident Response, SAST, IAST
Skills:
DAST, Cloud Security, Vulnerability Assessment, Penetration Testing, Gcp, Docker, Ids, Siem, Azure, Kubernetes, AWS, Threat Modelling, scanners, Secure Coding Practices, EDR, SAST
Skills:
Ips, Dlp, Penetration Testing, AWS, Waf, Siem, Azure, cloud security, Iam, Gcp, Vulnerability Management, encryption technologies, SOAR, nids, HIDS, EDR
Skills:
threat modeling , DAST, Pki, Mqtt, Java, Node.js, IOT Protocols, Python, Owasp Top 10, Security Groups, Iam, Kms, Oauth2, CI CD tools, Cognito, M2M communication, X.509 certificates, encryption standards, AWS security services, SAST, OIDC
Skills:
Sql, Python, LangChain, embeddings, RAG architecture, vector databases, Anthropic, AutoGen, LangGraph, LLM APIs, GCP Vertex AI, memory systems, IBM WatsonX, OpenAI, Cohere, LlamaIndex
Skills:
Http Protocol, Pentesting, Threat Analysis, Owasp Top 10, Testing Methodologies, Vulnerability assessment, SANS 25 Vulnerabilities, Fuzzing tools, Software exploitation, Cyber Security testing, Port scanning, Hardware security testing, Web applications scanning, Application protocols
Skills:
Testing Methodologies, Threat Analysis, Vulnerability assessment, Pentesting, Testing, Software exploitation, Control communication protocols, Port scanning, Application protocols, Hardware security testing, Fuzzing tools
