1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Review security designs for compliance with best practices and regulations.
Advise application and technical teams on securing solutions throughout the application lifecycle.
Align cybersecurity strategies with business objectives.
Identify and mitigate business threats through appropriate countermeasures.
Leverage technical expertise to defend against cyber threats using tools like firewalls, DLP, IDS/IPS, APIs, cloud security, etc.
Perform ...