Primajte oglase za posao imejlom
- ...mesh patterns — auth, mTLS, traffic shaping, circuit breaking. ~ Track record of legacy-to-services migration — strangler patterns, data backfills, dual-writes, cutovers without downtime. ~ Observability and security as defaults: IAM least-privilege, secrets management,...PredloženoPuno radno vremeRad na daljinuRad u kancelariji