Information technology security specialist
HaryanaTrillionloans
...Orca findings related to misconfigurations, vulnerabilities, exposed assets, and identity risks. Work with stakeholders to translate Orca alerts into actionable remediation plans. Secure Kubernetes clusters (EKS) including RBAC, network policies, secrets management, and pod security standards Implement container image scanning [...]
Category IT & Telecommunications