Protects digital assets by identifying vulnerabilities, implementing robust measures, and ensuring systems
remain resilient against cyber threats, thereby safeguarding operations and customer trust.
Key Responsibilities
environments.
scanning for vulnerabilities, secure configuration
orchestration platforms.
environments for unusual activities, vulnerabilities,
or breaches.
involving infrastructure or containers, coordinating
containment, remediation, and root cause analysis.
procedures specific to infrastructure and contain
environments.
containerization workflow.
penetration tests, and audits on infrastructure and
container setups.
infrastructure and container security.
measures, incident responses, and compliance
audits related to infrastructure and container
security.
Requirements
Security • EG