Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
Key Responsibilities:
Assess and analyze legacy VM-based applications to determine containerization readiness and approach.
Design and implement Docker container definitions and Kubernetes manifests for legacy apps.
Refactor and package applications for deployment in Azure Kubernetes Service (AKS) AWS ECS or Azure Container Apps.
Collaborate with Cloud Architecture and Application teams to understand dependencies configuration and runtime behaviors.
Set up container registries image versioning and secure container execution.
Assist with integration of new workloads into existing Terraform-based infrastructure as code (nice to have).
Document containerization workflows migration steps and operational runbooks.
Ensure container deployments follow best practices in security observability and scalability.
Required Skills & Experience:
4 years of experience in Cloud Infrastructure or DevOps roles.
Strong hands-on experience with Docker and containerizing legacy applications.
Proficiency in deploying and managing workloads in Azure or AWS (at least one required). Preference to AWS.
Experience with Kubernetes or managed services like AKS ECS or Azure Container Apps.
Understanding of CI/CD workflows and build pipelines.
Familiarity with networking and storage considerations in cloud-native deployments.
Excellent troubleshooting and debugging skills.
Nice to Have:
Exposure to Terraform ARM Templates AWS Cloud Formation tools and infrastructure-as-code methodologies.
Experience with container observability tools (e.g. Prometheus Azure Monitor CloudWatch).
Knowledge of application modernization strategies.
Familiarity with Agile workflows and ServiceNow task tracking.
Soft Skills:
Self-starter with the ability to work independently and manage priorities.
Clear communicator especially in cross-functional settings.
Comfort working in a globally distributed team and documenting work clearly.
PRIMARY PURPOSE: To manage the implementation of security measures to protect company data networks and computer systems. To focus on executing security fundamentals for threat detection investigation and response efforts.
ESSENTIAL FUNCTIONS and RESPONSIBILITIES Engineers implements and monitors security measures for the protection of computer systems networks and information. Identifies and defines system security requirements. Designs computer security architecture and develops detailed cyber security designs. Prepares and documents standard operating procedures and protocols. Configures and troubleshoots security infrastructure devices. Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks. Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs. Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management. Analyzes client and customer needs as required and provides clear and concise reports to leadership. Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained.
ADDITIONAL FUNCTIONS and RESPONSIBILITIES Performs other duties as assigned. Supports the organizations quality program(s). Travels as required.
QUALIFICATIONS Education & Licensing Bachelors degree in Information Systems computer science or related technology field from an accredited college or university preferred. Related technical institute certification preferred. Experience Eight (8) years of encryption technologies/algorithms digital forensics network topologies and access controls experience or equivalent combination of educated and experience required.
Skills & Knowledge
Knowledge of TCP/IP services Knowledge of audit and compliance
Knowledge of vulnerability management
Knowledge of penetration testing
Knowledge of various operating systems
Knowledge of desktop productivity software
Knowledge of Carbon Black Protection
Knowledge of Symantec Endpoint Protection and host data loss prevention
Knowledge of information technology security frameworks
Excellent oral and written communication skills including presentation skills
PC literate including Microsoft Office products
Analytical and interpretive skills
Strong organizational skills
Excellent interpersonal skills Ability to create and complete comprehensive accurate and constructive written reports
Ability to work in a team environment
Ability to meet or exceed Performance Competencies
WORK ENVIRONMENT When applicable and appropriate consideration will be given to reasonable accommodations. Mental: Clear and conceptual thinking ability; excellent judgment troubleshooting problem solving analysis and discretion; ability to handle work-related stress; ability to handle multiple priorities simultaneously; and ability to meet deadlines Physical: Computer keyboarding travel as required Auditory/Visual: Hearing vision and talking
NOTE: Credit security clearance confirmed via a background credit check is required for this position. The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions duties or local variances. Management retains the discretion to add or to change the duties of the position at any time.
Full-time