$80K — $100K *
We are looking for a Senior Technology Integration Engineer capable of determining method of extraction of security relevant data and identifying the important elements of vendor data sources that can be used by the NTT Security platform to deliver cyber security and compliance value to the client.
Position requires an engineer experienced in all of the emerging cloud technologies in order to support the ever increasing involvement with cloud native environments.
Successful candidates will be strong leaders who have excellent technical experience, a history of resolving issues in a dynamic, rapidly-growing environment, and have a consistent track record of delivery.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
•Learn the security space and all aspects of security devices/software and methodology.
•Understand/interpret any vendor documentation in order to identify method of extraction required to facilitate cyber security compliance/threat detection value.
•When method of extraction is not syslog forwarding, the Engineer will be responsible for creating requirements to produce a Log Transport Agent which will process the required data in order for the platform to be able to process. This can include working with APIs or database queries as required.
•Familiarity with cloud native log sources (e.g. Palo Alto Cortex Data Lake, AWS, Azure)
•Applies specialist knowledge to work on complex projects and identify solutions using creative means.
•Work with product management to clarify requirements and develop design documents based on business requirements.
•Understand logs and data elements required by the platform to satisfy the needs of the service.
•Works on complex issues where analysis of situations, or data, requires an in-depth evaluation of variable factors.
•Ability to research and determine how vendor data source should be configured in order to represent maximum value.
•Exercises judgement in selecting methods, techniques and evaluation criteria for obtaining results.
•Networks with key contacts outside own area of expertise.
•Work interactively with vendors, when required, to assist with expedition of process.
•Professionally document both internal (analysis, troubleshooting, vendor information) and external (vendor product configuration guides).
•Work interactively with developers in order to ensure the highest quality system products.
•Provide engineering level consultation delivered through the various client facing units, as required.
•Implement software development best practices and ensure others adhere to these standards.
•Must demonstrate senior level capabilities throughout entire Software Development Life Cycle (SDLC).
•Collaborate with remote and on-site resources; participate in meetings in various time zones, including mornings and evenings as needed.
•Bachelor’s Degree in Computer Science, Information Systems, Engineering or related field or 8+ years related experience.
•Proven experience in Information Security and/or Technology Engineering and support experience in either incident analysis or SIEM management.
•Senior engineering level experience with Splunk, Networking, Cyber Security, Linux, Mac OSX and Windows Operating Systems, Cloud native logging, Kubernetes/Docker.
•Demonstrated proficiency in Java and other languages, with secure and efficient coding in mind.
•Ability to understand business needs, deadlines, and priorities, and apply security best practice to develop effective solutions.
•Should possess the ability to interact with senior level engineers performing threat detection development as it relates to log parsing, log transport agent design and coding.
•Excellent interpersonal and organizational skills and oral and written communication skills.
•Strong analytical and problem solving skills while working in a team environment or independently.
Valid through: 3/26/2021