management measures as well as the identified security measures for the assigned applications Controls
Google, Mitel, Huawei, VoIP, Networking, and Security. You must demonstrate expertise in consulting
adherence to best practices, coding standards, and security guidelines while developing scalable and reliable
including a documented matrix in support of the security rules and risk.
Postgres, Influx
·       Experience securing cloud environments
·       Provide
external providers, vendors and end-users. Treat security as a first-class citizen Work closely with stakeholders
travel as stated in the Statement of Duties. 9. SECURITY LEVEL REQUIRED: Facility access. 10. AREA OF CONSIDERATION: disparate, complex datasets, with attention to security and confidentiality, and with sensitivity to the non-selection. As a positive medical clearance and security certification are a condition of employment, the stringent investigation prior to employment with USAID/SA. Submitting an Offer: All interested and eligible contract award: -Conditional Selection Letter -Security Eligibility Requirements -Medical Clearances or
travel as stated in the Statement of Duties. 9. SECURITY LEVEL REQUIRED: Facility access. 10. AREA OF CONSIDERATION: disparate, complex datasets, with attention to security and confidentiality, and with sensitivity to the non-selection. As a positive medical clearance and security certification are a condition of employment, the stringent investigation prior to employment with USAID/SA. Submitting an Offer: All interested and eligible contract award: -Conditional Selection Letter -Security Eligibility Requirements -Medical Clearances or
including a documented matrix in support of the security rules and risk. Translate conceptual user requirements
adherence to best practices, coding standards, and security guidelines while developing scalable and reliable