Information technology security specialist
HaryanaTrillionloans
...pod security standards Implement container image scanning and runtime security controls & enforce least-privilege access for workloads and services Run DAST tool to review application related changes & to identify runtime application vulnerabilities. Track remediation SLAs and produce security metrics and dashboards [...]
Category IT & Telecommunications