Job Profile
This position involves collaborating with product and policy experts to develop and co-create modifications to data standards in line with policy priorities and industry requirements.
Main Responsibilities
* Crafting comprehensive security frameworks for enterprise applications, cloud workloads, networks, and data platforms.
* Designing APIs that facilitate efficient, secure, and safe data transfer processes.
Data Security Protocols: This role requires expertise in implementing cybersecurity measures such as OAuth2 OIDC JWT TLS mTLS biometrics authentication technologies including cryptographic key management systems. By doing so you will be able to ensure secure transactions between different parties over the internet. Your main focus should be on protecting sensitive information from unauthorized access or theft by applying best practices of IT security within our company protocols such as ISO 27001 or other accepted international standards.
We're looking for individuals who have a deep understanding of computer system architecture which includes hardware & software components. Furthermore candidates should have an excellent knowledge about operating systems like Linux/Unix Windows etc., database management systems like MySQL PostgreSQL Oracle SQL Server etc., network protocols HTTP FTP SSH SFTP SCP RDP VPN SSL/TLS TCP/IP SMTP DNS DHCP ICMP IGMP MCAST ARP PING TRACERT NETSTAT ICMPV6 SCTP ADB UDP TELNET RTSP CIFS NFS SMB RPC DCOM EPMAP ETW Remote Desktop Connection DLL SID PID LSA WMI Netsh Cmdlet X-Y-Z-Z series DDR-RAM SDM SVMA DVC DLB DBDL FOEM HDR Encrypted Access Memex DC Port Channel Provision Thread Migration MSI MPIM CE XMLRP N-A MAC CECh DR GKM DR FGMS Q-KTE-WHS-X PQ QR STMG XS WS TS WTS F MM FROEM - SMART-Tech!!!-low since TG AC-G) TJ PLC Sinope Zigbee O Pens Mutual rZZG sicNet via Hyperblue Smartm AttSt Z Sinow Cone. thise MPC ]. ----------------------------------- Main Skills Required: Deep technical knowledge; Strong experience in design development testing implementation deployment monitoring maintenance training support services high level engagement project planning tasks risk assessment problem-solving strategy execution team coordination constant improvement initiative sourcing proof-of-concept documentation compliance metrics tracking credential enforcement system audits forensics incident response,