The ideal candidate will draw upon exemplary engineering, project management, critical thinking, problem solving skills, and a passion for creating reliable and maintainable programs/systems. The candidate should be open to new challenges, extremely good at multi-tasking, innovative, creative, self-directed and a great team player.
In this role, you will tackle challenging, novel situations every day and given the size of this initiative, youll have the opportunity to work with multiple technical teams at Amazon in different locations.
In this role, you will ensure that daily compliance tasks are completed in a timely fashion and tracked in the appropriate ticketing system; understand and review router, switch and firewall configurations.
In this position, you will be on the cutting edge on cloud technology by building next-generation applications by leveraging the full weight of the Azure cloud ecosystem behind you, including Azure API Management, Azure Logic Apps, and next-generation data technologies.
In this role, the selected candidate must have a strong coding skills are a must. You will need to use a variety of programming languages (C# for automation harnesses, C/C++ for tools that needs to run in the kernel, and occasionally even assembly for binary level mitigation enforcement such as CFG).
In this role, the selected candidate will develop and uses scripting tools and automation to develop real-time monitoring, metrics, certification and quality assurance applications. Participate in the research, analysis, design, testing and implementation of complex computer network security/protection technologies for company information and network systems/applications.
In this role, you will be responsible for
work with many flavors of Linux and are extremely comfortable at the command line, including mastering tools like vi / emacs and understanding beyond basics of grep, awk, sed, etc.
In this role, you will be collaborating with the engineering organization to advise on secure architecture/design, attack surface area reduction, least privileged design, threat mitigation, and security best practices. The selected candidate will also be responsible for educating the company on vulnerabilities & exploits with proof of concepts.