Description:
8 Required Proven work in security architecture, demonstrating solutions delivery, principles and emerging technologies, designing and implementing security solutions. Continuous monitoring and making improvements to those solutions. 8 Required Designing and implementing the security measures needed to protect data stored on public clouds against unauthorized access, including secure authentication methods, encryption, access control lists, intrusion detection systems, firewalls, other measures
Feb 9, 2026;
from:
dice.com