reading, south east england, United Kingdom Hybrid / WFH Options
Fynity
Postgres' vacuum/MVCC process. Proven experience with query optimization and database performance tuning. Hands-on experience with AWS services such as EC2, S3, VPC, and IAM. Solid understanding of database security principles and compliance frameworks Experience implementing robust backup and recovery strategies. Desirable Proficiency with infrastructure automation tools like More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Computer Futures
Responsibilities: Design, implement, and maintain scalable, secure, and high-performance AWS-based multi-tenanted platforms. Collaborate with cross-functional teams to develop and optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identity … experience as an AWS Platform Engineer, with a strong focus on multi-tenanted platforms. Extensive knowledge of AWS services, including EC2, S3, RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identity and access More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Computer Futures
Responsibilities: Design, implement, and maintain scalable, secure, and high-performance AWS-based multi-tenanted platforms. Collaborate with cross-functional teams to develop and optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identity … experience as an AWS Platform Engineer, with a strong focus on multi-tenanted platforms. Extensive knowledge of AWS services, including EC2, S3, RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identity and access More ❯