Making risk assessment and security policy analysis

Assignment Help Basic Computer Science
Reference no: EM132359129

Document 1:

This document had 13 responsibilities for which detail description and courses matching to the responsibility should be added only related to computer science.

The position title is senior devops engineer.

Document 2:

This document had courses and their titles.

Duties and Responsibilities:

Design and develop systems architecture with proper contingency planning by making risk assessment and security policy analysis.

Design and Implement single control dashboard with nodeJS application for Continuous integration, Deployment and delivery with various DevOPs tools like Bitbucket, Jenkins, Artifactory and Ansible.

Experience in Linux, and using Shell, Python scripting to automate process to troubleshoot and run the services on Virtual Systems according to requirement.

Involved in building Platform as a service (Paas) with Docker, deployed various applications through Dockers containers into the Docker swarm data center using Ansible playbook scripts.

Configure and support the version control systems for code repositories using Bitbucket, GitHub, SVN, and to scan quality of code by integrating Sonarqube.

Design and develop the continuous Sync or replication of data artifacts from on premises to cloud datacenters.

Implement secure socket Layer (SSL) termination strategies for API gateway for public facing applications through NGINX gateway and WSO2 proxy web application servers.

Managing Applications using Amazon AWS cloud which includes services like: EC2, S3, EBS, VPC, ELB, AMI, SNS, RDS, IAM, Route 53, Auto scaling, Cloud Front, Cloud Watch, Cloud Trail, Cloud Formation, OPS Work, Security Groups.

Design, Develop Various Cloud formation template scripts for auto scaling and self-healing strategies for AWS and hybrid cloud based systems.

Experience with Quality and Information Assurance methodologies, Requirement analysis, writing test plans and test cases based on system requirement specifications to integrate with Jenkins.

Liaise with developers, business analysts, and user representatives for technical guidance and support in application design, development, troubleshooting and document reviews.

Superior analytical, troubleshooting, communication and presentation skill and technologies shall be utilized in performing the duties.

Provide on call support for production environment for major software releases and bug fixes. etc.

Attachment:- Detailed position description-coureswork FORMAT.rar

Attachment:- courses.rar

Reference no: EM132359129

Questions Cloud

Describe how security professional would apply : Explain how you can apply this to your current job or describe how a security professional would apply what you have learned to their current role.
Discussions focused on military aircraft : Some virtual teams at Boeing have discussions focused on military aircraft. Do some Internet research on UC security mechanisms.
Information systems infrastructure-evolution and trends : Research at least two articles on the topic of Information systems infrastructure: evolution and trends.
Security should be periodically reassessed : IS311-Security Should Be Periodically Reassessed; what are the benefits of periodic review of security policy and how often should policy be reviewed?
Making risk assessment and security policy analysis : Design and develop systems architecture with proper contingency planning by making risk assessment and security policy analysis.
Justify characterizing data types according to task taxonomy : Justify characterizing data types according to task taxonomy.
Despite increases in computing power and network bandwidth : Despite increases in computing power and network bandwidth, many user interfaces are still largely text oriented, with a few icons and illustrations.
Introduced impact of the global digital divide : Introduced the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world's ICT capabilities encounter
Benefits of incorporating crowdsourcing in design project : Analyze and discuss at least three benefits of incorporating crowdsourcing in a design project. Describe legal, societal, and ethical issues in HCI design.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Rewrite the shape hierarchy to store the area

Rewrite the Shape hierarchy to store the area as a data member and have it computed by the constructor. Make area a nonvirtual function that returns.

  What bankruptcy or other legal issues are implicated

What contractual, corporate, bankruptcy or other legal issues are implicated in the above - ability of alleged infringing party to make financial restitution

  Create a program that asks users to enter the name

Create a program that asks users to enter the name of their favorite team. Have the program display this team's name. Then have program ask the user to enter the name of their five previous oponents,

  Highest populated cities in descending order

a. Select the top 10 highest populated cities in descending order b. Select the top 10 lowest populated cities in ascending order

  Disconnect occurs in the reimbursement department

The next disconnect occurs in the reimbursement department. The reimbursement department is often responsible for making sure the charges are correct.

  Prior insertion system.out.printf formatting output in java

Prior to insertion of System.out.printf(), formatting the output to the console in Java

  Graphically and mathematical solutions are the same

a. Show graphically the bundle of x1 and x2 that will maximize utility b. Solve mathematically for the bundle of goods that will maximize utility

  Recommend for naming files in business

Word allows great flexibility when naming files. Many businesses and individuals establish their own rules for naming files. What kinds of rules would your recommend for naming files in business? For personal use?

  Which of the following are not valid java identifiers

Which of the following are not valid Java identifiers? Why?

  Management to read because of its visual nature

This project cycle plan chart looks very much like a bar chart and is easy for management to read because of its visual nature

  Application and database services

Please read this in its entirety before answering. Please provide references also. Many organizations are using cloud services to provide application and database services to their users and their customers.

  How to convert a binary32 number to a decimal value

How are numbers stored in these formats? and briefly describe: The fields in the binary32 format (size, purpose, etc)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd