Understanding of classical or cloud-native design patterns is required.
Knowledge of security configuration management, container security, endpoint security and secrets management as they are applied to cloud applications.
Knowledge of network architecture, proxy infrastructure, and programs to support network access and enablement.
Experience with multiple Information Security domains, such as Infrastructure Vulnerability, Data Loss Prevention, End User Security, Network Security, Internet Security, Identity & Access Management, etc.