Information technology security specialist
HaryanaTrillionloans
...security groups, NACLs, and firewall policies. Configure, manage, and optimize Orca Security for cloud posture management, vulnerability detection, and risk prioritization. Analyze Orca findings related to misconfigurations, vulnerabilities, exposed assets, and identity risks. Work with stakeholders to translate Orca alerts [...]
Category IT & Telecommunications