Cyber security analyst
BangalorePeople Prime Worldwide
...on Red Hat Enterprise Linux systems using pluggable authentication modules (PAM) and name switch service (NSS).5. Using Kerberos and LDAP to centrally manage user authentication.6. Red Hat operating systems, configure, implement, and deploy systems and take care of security issues, besides [...]
Category Banking, Insurance, Finance & Accountancy