| Roles And Responsiblities: | Support secure development by integrating SSDLC and DevSecOps practices into CI/CD pipelines. • Conduct technical security assessments to identify configuration weaknesses and recommend remediations. • Operate data protection and DLP controls including incident response workflows for data exposure. • Collaborate with infrastructure teams to close security gaps and verify control effectiveness. • Maintain technical documentation including architecture diagrams playbooks and tool configurations. |
| Scope Of Work: | Support secure development by integrating SSDLC and DevSecOps practices into CI/CD pipelines. • Conduct technical security assessments to identify configuration weaknesses and recommend remediations. • Operate data protection and DLP controls including incident response workflows for data exposure. • Collaborate with infrastructure teams to close security gaps and verify control effectiveness. • Maintain technical documentation including architecture diagrams playbooks and tool configurations. |
Roles And Responsiblities:Support secure development by integrating SSDLC and DevSecOps practices into CI/CD pipelines. • Conduct technical security assessments to identify configuration weaknesses and recommend remediations. • Operate data protection and DLP controls including incident response wor...
| Roles And Responsiblities: | Support secure development by integrating SSDLC and DevSecOps practices into CI/CD pipelines. • Conduct technical security assessments to identify configuration weaknesses and recommend remediations. • Operate data protection and DLP controls including incident response workflows for data exposure. • Collaborate with infrastructure teams to close security gaps and verify control effectiveness. • Maintain technical documentation including architecture diagrams playbooks and tool configurations. |
| Scope Of Work: | Support secure development by integrating SSDLC and DevSecOps practices into CI/CD pipelines. • Conduct technical security assessments to identify configuration weaknesses and recommend remediations. • Operate data protection and DLP controls including incident response workflows for data exposure. • Collaborate with infrastructure teams to close security gaps and verify control effectiveness. • Maintain technical documentation including architecture diagrams playbooks and tool configurations. |
View more
View less