Architecture (ZTA) and Identity & Access Management (IAM) controls. Perform patch management and vulnerability remediation for IT.... Securing cloud environments (AWS, Azure, Google Cloud) with Zero Trust, CASB, and cloud-native security controls. IAM...
Lugar:
USA | 25/12/2025 18:12:56 PM | Salario: S/. $80000 - 128000 per year | Empresa:
Peraton and technologies that support automated certificate lifecycle management, including integration with IAM and IGA platforms... of cybersecurity, IAM, and endpoint management products to engage with technical decision-makers on the customer side. Strategic...
, strengths/weaknesses, and when to use each. Preferred qualifications • Security and compliance best practices: IAM, secrets...
, and manage infrastructure on AWS, including EC2, VPC, IAM, S3, Lambda, RDS, and CloudWatch. Should have strong data integration...
Lugar:
USA | 25/12/2025 18:12:20 PM | Salario: S/. No Especificado | Empresa:
TrinityTech and deploy cloud-native applications using AWS services including EC2, Lambda, S3, RDS, DynamoDB, API Gateway, and IAM Implement..., Lambda, S3, IAM, RDS, DynamoDB, and VPC. Proficiency in CI/CD pipeline setup and maintenance. Experience...
This is a Remote Position The Identity and Access Management (IAM) Engineer will provide services to assist... strategic, comprehensive enterprise IAM frameworks, guidelines and best practices with focus on ensuring that the integrity...
, and governance compliance. 2. AWS Cloud Development Integrate Foundry with AWS (S3, Lambda, Glue, IAM, API Gateway, Athena... Cloud: AWS (S3, Lambda, Glue, IAM) Tools: Git, Docker(optional) Concepts: Data engineering, APIs, distributed systems...
experience Strong in COBOL, CICS, JCL, SAS, DB2, VSAM, IAM, EZT, ICETOOL, SORT and REXX Need to understand API...
concepts, including VPCs, subnets, and security groups. Adopt cloud security best practices, including IAM. Implement...
Experience integrating CDM components such as: Vulnerability scanners Endpoint security tools IAM solutions Network... (ZTA) principles Cloud-native security controls, CSPM, CASB, and encryption Support implementation of IAM, PAM, and RBAC...