Making risk assessment and security policy analysis

Assignment Help Basic Computer Science
Reference no: EM132359129

Document 1:

This document had 13 responsibilities for which detail description and courses matching to the responsibility should be added only related to computer science.

The position title is senior devops engineer.

Document 2:

This document had courses and their titles.

Duties and Responsibilities:

Design and develop systems architecture with proper contingency planning by making risk assessment and security policy analysis.

Design and Implement single control dashboard with nodeJS application for Continuous integration, Deployment and delivery with various DevOPs tools like Bitbucket, Jenkins, Artifactory and Ansible.

Experience in Linux, and using Shell, Python scripting to automate process to troubleshoot and run the services on Virtual Systems according to requirement.

Involved in building Platform as a service (Paas) with Docker, deployed various applications through Dockers containers into the Docker swarm data center using Ansible playbook scripts.

Configure and support the version control systems for code repositories using Bitbucket, GitHub, SVN, and to scan quality of code by integrating Sonarqube.

Design and develop the continuous Sync or replication of data artifacts from on premises to cloud datacenters.

Implement secure socket Layer (SSL) termination strategies for API gateway for public facing applications through NGINX gateway and WSO2 proxy web application servers.

Managing Applications using Amazon AWS cloud which includes services like: EC2, S3, EBS, VPC, ELB, AMI, SNS, RDS, IAM, Route 53, Auto scaling, Cloud Front, Cloud Watch, Cloud Trail, Cloud Formation, OPS Work, Security Groups.

Design, Develop Various Cloud formation template scripts for auto scaling and self-healing strategies for AWS and hybrid cloud based systems.

Experience with Quality and Information Assurance methodologies, Requirement analysis, writing test plans and test cases based on system requirement specifications to integrate with Jenkins.

Liaise with developers, business analysts, and user representatives for technical guidance and support in application design, development, troubleshooting and document reviews.

Superior analytical, troubleshooting, communication and presentation skill and technologies shall be utilized in performing the duties.

Provide on call support for production environment for major software releases and bug fixes. etc.

Attachment:- Detailed position description-coureswork FORMAT.rar

Attachment:- courses.rar

Reference no: EM132359129

Questions Cloud

Describe how security professional would apply : Explain how you can apply this to your current job or describe how a security professional would apply what you have learned to their current role.
Discussions focused on military aircraft : Some virtual teams at Boeing have discussions focused on military aircraft. Do some Internet research on UC security mechanisms.
Information systems infrastructure-evolution and trends : Research at least two articles on the topic of Information systems infrastructure: evolution and trends.
Security should be periodically reassessed : IS311-Security Should Be Periodically Reassessed; what are the benefits of periodic review of security policy and how often should policy be reviewed?
Making risk assessment and security policy analysis : Design and develop systems architecture with proper contingency planning by making risk assessment and security policy analysis.
Justify characterizing data types according to task taxonomy : Justify characterizing data types according to task taxonomy.
Despite increases in computing power and network bandwidth : Despite increases in computing power and network bandwidth, many user interfaces are still largely text oriented, with a few icons and illustrations.
Introduced impact of the global digital divide : Introduced the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world's ICT capabilities encounter
Benefits of incorporating crowdsourcing in design project : Analyze and discuss at least three benefits of incorporating crowdsourcing in a design project. Describe legal, societal, and ethical issues in HCI design.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd