Must hold experience within AWS and hold relevant AWS certifications (SA1, DOP-C02 for example). Experience with ECS/Kubernetes. Experience with infrastructure as a code and config management tools. Sctipting experience (PowerShell, Bash ect.). Experience with either Python or Typescript as well as knowledge of Java. Ideally have set up a Centre of Excellence (CoE) team More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Configuration and Data Manager Crawley (3 days per week onsite, 2 days from home) – 9 month duration - £65 p/h Ltd (Outside IR35) We have a great opportunity for a Configuration and Data Manager to join our Aerospace and Defence clients configurationmanagement team, where your role will be focussed on Flight Avionics. As a … Configuration and Data Manager within Flight Avionics, you will have the opportunity to work with a team of engineers focused on the development, delivery and support of products and programmes to a wide variety of customers in the aerospace sector; covering both the Civil and Military domains. The Configuration and Data Manager is responsible for the tailoring and … the realisation of the ConfigurationManagement Systems against the contractual and market requirements within their perimeter. They are responsible and accountable for the consistency of the configuration information. They interface with various internal and external stakeholders. They may coordinate others ConfigurationManagement Roles or delegate some activities to the Configuration Administration Roles for the More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Rentokil Initial plc
of user, policy, regulatory, and resource demands Authors and updates security documentation to include, but not limited to, standards, policy, system security plans, contingency plans, standard operating procedures, and configurationmanagement plans Analyzes information assurance-related technical problems and provides engineering and technical support for solving these problems Identifies, reports, and resolves security violations while also proactively seeks More ❯