"Data security", Encryption, Protection, TEE, Hardware, servers, Containers, Kubernetes, Azure.
Knowledge/Exposure with ACC, ACI, AKS,TEE config(s),Confidential Inferencing.
Knowledge of deploying Policies, hands on with Git, Git bash, setting up Containers.
Deep experience with Kubernetes & Docker/Docker Build (MUST)
Good understanding of Triton client libraries/inferencing, Confidential Container Instances.
Deep/hands on with Sidecar/Confidential sidecar instances, AZ Container Registry, Confidential Clean Room.
ACC encrypts data in memory in hardware-based trusted execution environments and processes.
Hardware-based security plays a central role in confidential computing, creating a hardware-based trusted execution environment (TEE) for running computations in encrypted memory.