scalable and maintainable infrastructure that supports software delivery pipelines and application requirements while establishing and following DevOps best practices within the organisation. AWS Service Management : Deploy and manage core AWS services including EC2, S3, VPC, and ECS to support application deployment and operations. CI/CD Pipeline Development : Build … and delivery. Container Orchestration : Work with Docker containers and manage deployments on Amazon ECS, implementing auto-scaling and load balancing solutions. Security and Access Management : Implement AWS security best practices, including IAM permissions, AWS Organizations, Secrets Manager for credentials, and security groups to ensure secure cloud resources. Cloudflare … Integration : Configure and maintain Cloudflare services for DNS management, CDN, and DDoS protection to enhance security and performance. Monitoring and Optimization : Implement monitoring solutions using AWS CloudWatch and related tools to ensure system health and performance while optimizing resource utilization. Documentation and Knowledge Sharing : Create and maintain documentation for More ❯
Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secretsmanagement Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design … principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and key management/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. Experience implementing custom … one public cloud provider (AWS, GCP, or Azure) Experience managing PKI/X.509 certificate infrastructure. Extensive experience supporting and implementing TLS/SSL certificate management systems Proficient with Token-based authentication services, Perfect Forward Security (PFS), Apache, Nginx, HAProxy Solid knowledge of Linux security and system operations. Benefits Roku More ❯
AKS, serverless) Deep knowledge of Terraform , infrastructure as code, and pipeline validation frameworks Skilled in securing pipelines using SAST/DAST , dependency scanning, and secretsmanagement Familiar with regulated environments and compliance automation (e.g., Azure Policies) Strong communicator with a consultative mindset and a passion for clean, secure More ❯
AKS, serverless) Deep knowledge of Terraform , infrastructure as code, and pipeline validation frameworks Skilled in securing pipelines using SAST/DAST , dependency scanning, and secretsmanagement Familiar with regulated environments and compliance automation (e.g., Azure Policies) Strong communicator with a consultative mindset and a passion for clean, secure More ❯
expertise on security systems and engineering patterns. Develop and implement protocols, algorithms, and software applications to protect sensitive data and systems. Manage and protect secrets, ensuring they are securely generated, stored, and used. Conduct audits to monitor, identify, and assess vulnerabilities in the bank's infrastructure/software and … developers and security teams, to ensure cryptographic solutions align with business objectives, security policies, and regulatory requirements. Develop, implement, and maintain Identity and Access Management solutions and systems. Assistant Vice President Expectations Advise and influence decision making, contribute to policy development, and ensure operational effectiveness. Collaborate with other functions More ❯