Demonstrate comprehensive knowledge of core security fundamentals including network security protocols, encryption technologies, Identity and Access Management (IAM), and security compliance frameworks. Troubleshoot operating systems and networking concepts including HTTP/s, TCP/IP, DNS, OSI model, routing, switching, firewalls, LAN/WAN, and proficiency with networking tools such as traceroute, iperf, dig, and CURL. In depth understanding of identity and access management concepts and technologies for securing corporate access, including SSO, SAML, and Identity federation. Experience in securing architectures against various attacks such as Distributed Denial of Service (DDoS) and SQL Injection is essential, along with comprehensive understanding of vulnerability management. Deep knowledge of cryptography concepts including encryption types, modes of encryption, algorithms, and the underlying architecture that enables secure communication between users and servers through digital certificates and Public Key Infrastructure is required.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level