Found 4 result(s).
MQ Team Activities Apply configuration changes to MQ software products as requested by application owner Provisioning of log files from MQ Perform restarts, startup and shutdown of the MQ Create additional QMGR on customer request Request of recovery of sources and run time data from MQ Install IBM-rated High Severity, Medium Severity and Low Severity MQ Patches during pre-approved change window, ...
Job Type: Hourly
Web Service Amazon Web Services Java RESTful Architecture Penetration Testing Information Security SOAP IBM DataPower Microservice IBM MQ Web Application Security WSO2 JSON IBM WebSphere RESTful API
Job Overview: We are looking for an experienced Cybersecurity Consultant to provide guidance on implementing a Zero Trust security model and recommend the best tools for our security needs. This is a consultation-based engagement focused on discussing best practices, security strategies, and tool selection, without requiring an in-depth assessment of our current systems. Key Responsibilities: Prov...
Job Type: Hourly
Information Security Vulnerability Assessment Penetration Testing Network Security Encryption Security Analysis Firewall Web Application Security Cloud Security Framework Security Infrastructure
Job Overview: We are looking for an experienced Cybersecurity Consultant to provide guidance on implementing a Zero Trust security model and recommend the best tools for our security needs. This is a consultation-based engagement focused on discussing best practices, security strategies, and tool selection, without requiring an in-depth assessment of our current systems. Key Responsibilities: Prov...
Job Type: Hourly
Cloud Security Framework Information Security Vulnerability Assessment Penetration Testing Network Security Encryption Security Analysis Firewall Web Application Security Security Infrastructure
I'm looking for a seasoned cybersecurity analyst with expertise in application security, particularly focused on web applications. The analysis should cover: - Authentication and Authorization: Examine our current systems for user management and access control. - Data Encryption and Storage: Evaluate our methods for encrypting sensitive data and the security of our storage solutions. - Input...
Delivery Time: 2 days left days
Internet Security JavaScript React.js Framework Web Security