This role involves analyzing existing cloud security measures/controls and creating new and enhanced security methods. This role is part of a larger team dedicated to cloud-based management and security. The role is also responsible for the development...QualificationsGrade 12 / MatricAcademic qualifications in computer science, cybersecurity, or any related field.Recognized industry certifications in cloud security- CSA CBK, CCSP, CISSP.Experience3 years in a Customer Service environmentAt least 5 years of experience in cybersecurity.At least 3 years of experience and hands-on expertise in cloud security.Practical knowledge of public cloud offerings such as AWS, Azure, and GCP.Practical knowledge of services related to cloud computing, network, storage, content delivery, administration and security, deployment and management, automation technologies.Robust microservices programming (AWS Lambda, Docker, etc.)Good understanding and exposure to cloud standards, architecture, and models.Experience with PKI, SSL, SSH etc.Hands-on knowledge of automation and Dev Sec Ops skills.Good understanding of software development principles, including design patterns, code structure, programming languages, continuous integration, continuous deployment, and deployment orchestration.Experience with open-source software security.Experience with network protocols and deep packet inspection.Knowledge of microservices, Kubernetes, Docker, etc.Knowledge and SkillsStrong technical skills, including experience with Linux and Windows operating systems, scripting languages, and cloud provider ecosystems like Amazon AWS, GCP, and Azure.Excellent attention to detail, as they must constantly monitor systems to ensure there are no external threats.Excellent oral and written communication skills will be essential when interacting with team members.Strong problem-solving skills in order to swiftly deal with threats or flaws in cloud environments.Skilled in discussing complex security issues in understandable business terms.Detailed knowledge of system security vulnerabilities and remediation techniques.Ability to recommend solutions based on use cases and business requirements.Stay abreast with emerging technologies and threats and ability to proactively assess and evaluate the adoption thereof in the organization.
#J-18808-Ljbffr