- “Data security”, Encryption, Protection, TEE, Hardware, servers, Containers, Kubernetes, Azure.
- Knowledge/Exposure with ACC, ACI, AKS,TEE config(s),Confidential Inferencing.
- Knowledge of deploying Policies, hands on with Git, Git bash, setting up Containers.
- Deep experience with Kubernetes & Docker/Docker Build (MUST)
- Good understanding of Triton client libraries/inferencing, Confidential Container Instances.
- Deep/hands on with Sidecar/Confidential sidecar instances, AZ Container Registry, Confidential Clean Room.
- ACC encrypts data in memory in hardware-based trusted execution environments and processes.
- Hardware-based security plays a central role in confidential computing, creating a hardware-based trusted execution environment (TEE) for running computations in encrypted memory.
Git container-registry azure-container-instances Docker tee azure-aks Kubernetes triton acc Azure