and Nexus platforms across LAN and WAN Firewalls: Cisco ASA, Checkpoint, Palo Alto, Pulse Secure, NSX Authentication: SAML, SSO, LDAP, Active Directory IPSEC, GRE, DNS, HTTP, HTTPS, Proxy and SSL F5 BIG IP load balancers and wireless WLC/AP technologies Strong network troubleshooting skills and use of sniffers including Wireshark Ability to produce HLD and LLD documentation and map More ❯
/Experience The ideal candidate will have the following: Hands-on experience in building and configuring identity and key management systems. Strong knowledge of cryptographic principles, PKI, TLS/SSL, and encryption standards. Familiarity with OpenShift, Kubernetes, and container security best practices. Proficiency in automation tools (eg, Ansible, Terraform) for IKP deployment. Experience with enterprise IAM solutions and API integration. More ❯
of Load Balancing technologies such as F5 BIG IP (LTM/GTM) VMWare Next Gen Load Balancer (formerly AVI Networks) Working knowledge of TCP/IP, HTTP/S, SSL certificates, NAT, DNS, and Layer 7 protocols Comfort using CLI and GUI interfaces for network appliance configuration Preferred: Experience building from base and upgrading firmware of Web Proxies Experience of More ❯
Experience The ideal candidate will have the following: Deep expertise in Identity and Key Management Platforms (IKP) and cryptographic key life cycle management. Strong knowledge of PKI, TLS/SSL, and encryption standards. Familiarity with OpenShift, Kubernetes, and container security best practices. Experience with enterprise IAM solutions and integration with cloud platforms. Excellent understanding of regulatory requirements (eg, PCI DSS More ❯