Public Cloud Windows Engineer
Directory (AD) policies in line with IAM standards. Identify, and remediate security vulnerabilities reported by scanning tools...
Directory (AD) policies in line with IAM standards. Identify, and remediate security vulnerabilities reported by scanning tools...
identity and access management (IAM) policies and roles. Monitor, identify, and remediate security vulnerabilities reported... (Terraform, CloudFormation, ARM templates, etc.). Familiarity with cloud-native security best practices (IAM, network security...
and Compliance: Enforce database security policies, encryption (at rest and in transit), and access controls via IAM roles/policies... security principles, IAM, and encryption mechanisms. Experience with Terraform and Infrastructure-as-Code (IaC) practices...
identity and access management (IAM) policies and roles. Monitor, identify, and remediate security vulnerabilities reported... (Terraform, CloudFormation, ARM templates, etc.). Familiarity with cloud-native security best practices (IAM, network security...
, you'll serve as a subject matter expert, partnering with peers across infrastructure, application, IAM, and security teams..., and vendor collaboration. Collaborate with IAM teams (Okta) to support identity lifecycle automation and seamless user...
, and SSH key policies in line with IAM standards. Monitor, identify, and remediate security vulnerabilities reported...
Directory (AD) policies in line with IAM standards. Identify, and remediate security vulnerabilities reported by scanning tools...
controls via IAM roles/policies across all clouds. Support audits by ensuring logging, alerting, and compliance with industry..., and triggers. Solid understanding of cloud security principles, IAM, and encryption mechanisms. Experience with Terraform...
least-privilege access, encryption, and network segmentation. Implement and manage identity and access management (IAM) policies... best practices (IAM, network security, data encryption, etc.). Proficiency in scripting languages (Python, Bash, PowerShell...
least-privilege access, encryption, and network segmentation. Implement and manage identity and access management (IAM) policies... best practices (IAM, network security, data encryption, etc.). Proficiency in scripting languages (Python, Bash, PowerShell...