or expertise in a subset of these areas: Cloud technologies: AWS primarily Azure and GCP beneficial Cyber security Vulnerability management (e.g. tenable) IDAM (e.g Azure AD, Keycloak) Virtualisation and ContainerisationContainerisation (e.g. Docker, Podman) Container management (e.g. Kubernetes) Architectural styles Microservices Serverless DevSecOps tooling Version control (e.g. Git) Continuous Integration/Deployment (e.g. Gitlab CI/CD) Infrastructure as code More ❯
application deployment and configuration management Automation/Configuration management tools experience, i.e., RedHat, Puppet, Chef, Ansible Knowledge of IAC technologies such as Cloudformation or Terraform Strong Linux Sysadmin skills Containerisation and orchestration technologies (Docker & Kubernetes) Good knowledge of internet communication concepts and protocols - TCP/IP, DNS, HTTP Experience of deploying Continuous Integration solutions An awareness of security considerations in More ❯
Farnborough, Hampshire, South East, United Kingdom
Sanderson Government and Defence
design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration (ISO42001 knowledge preferable), ITHC scoping More ❯