Join our companies in their quest to drive powerful, positive, change that endures.

Senior Production Security Engineer (Remote US)

Anomali

Anomali

Redwood City, CA, USA
Posted on Wednesday, September 21, 2022
<div><br></div><div><br></div><div><b style="font-size:13.5pt;">Company Description:</b></div><div> <span style="font-size:10.5pt;"> </span><span style="font-size:11pt;">Anomali, founded in 2013, is the recognized leader in intelligence-driven cybersecurity. More than 1,500 public and private sector organizations rely on Anomali to see and detect threats more quickly, reduce the risk of security breaches, and improve security operations productivity. Anomali solutions serve customers around the world in nearly every major industry vertical, including many of the Global 2000. As an early threat intelligence innovator, Anomali was founded in 2013 and is backed by leading venture firms including GV, Paladin Capital Group, In-Q-Tel, Institutional Venture Partners, and General Catalyst. Learn more at </span><a href="http://www.anomali.com/" style="font-size:11pt;" class="postings-link">www.anomali.com</a><span style="font-size:11pt;">. </span> </div><div><span style="font-size:11pt;"> </span></div><div> <span style="font-size:11pt;">Quite simply our sole mission is to help make enterprises more secure and maximize the return on their security investments. Anomali helps organizations find and respond to cyber threats. We bring to your security and threat intelligence teams the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic </span><u style="font-size:11pt;">before</u><span style="font-size:11pt;"> it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your existing internal security and IT systems.</span> </div><div><br></div><div><span style="font-size:10.5pt;"> </span></div><div><b style="font-size:13.5pt;">Overview: </b></div><div>Anomali is looking for a hands-on senior cloud security engineer to improve and maintain our security posture. We are looking for someone with 10+ years’ experience in Security with a deep understanding of various technologies in the security domain.</div><div>This role will require someone passionate about DevSecOps, with an accomplished background in secure software engineering, with strong exposure to cloud platform security practices. A passion for building secure world-class infrastructure and tooling in terms of reliability, scalability, and accessibility will be paramount.</div><div>The person in this role will help implement a capability driven, <b>highly automated</b> approach to our <b>security operations, monitoring &amp; detection, incident response capabilities</b>, and our overall information security risk management program efforts.</div><div>A successful person in this role will be an individual who is an avid problem solver with a background in <b>systems design, architecture and compliance</b> and is one who loves an environment focused on software engineering practice excellence, code reviews and regular pairing.</div><div>Possess excellent communication skills, as well as being happy to collaborate with others, guiding and mentoring where needed.</div><div>A strong background with CI/CD pipelines and security related tooling</div><div><br></div><div><b style="font-size:18px;">Responsibilities</b></div><div>●<span style="font-size:7pt;"> </span>Administration of Certificate Lifecycle Management Services and infrastructure</div><div>●<span style="font-size:7pt;"> </span>Administration of Encryption and Key Management Services and infrastructure</div><div>●<span style="font-size:7pt;"> </span>Administration of Key Vaults, Cloud Cryptographic and PKI Services</div><div>●<span style="font-size:7pt;"> </span>Multi-cloud IAM integration and administration</div><div>●<span style="font-size:7pt;"> </span>Integration, validation and automation across cryptographic frameworks</div><div>●<span style="font-size:7pt;"> </span>Evaluate cryptographic tools, products and frameworks</div><div>●<span style="font-size:7pt;"> </span>Troubleshoot cryptographic anomalies, and issues across the enterprise</div><div>●<span style="font-size:7pt;"> </span>Negotiating and liaising with different technology teams within the organization.</div><div>●<span style="font-size:7pt;"> </span>Facilitate and embed security controls across our infrastructure and into our CICD pipelines.</div><div>●<span style="font-size:7pt;"> </span>Set up monitoring dashboards, alerts, log management, and other security operations capabilities by utilizing industry standard tools and platforms (SIEMs) alongside our currently deployed toolsets/platforms.</div><div>●<span style="font-size:7pt;"> </span>Help enhance Incident Response capabilities including Runbooks, reputation management, etc.</div><div><br></div><div><b style="font-size:18px;">Qualifications</b></div><div><b>Specific Experience needed to be successful in this role:</b></div><div> </div><div>●<span style="font-size:7pt;"> </span>Knowledge of IAM concepts, including but not limited to provisioning, RBAC, SCIM, LDAP, and governance and authorization standards</div><div>●<span style="font-size:7pt;"> </span>Experience with identity governance platforms</div><div>●<span style="font-size:7pt;"> </span>Experience with federated identity platforms/products</div><div>●<span style="font-size:7pt;"> </span>Knowledge of current Identity providers and protocols such as Oauth 2.0, OpenID Connect, and SAML 2.0. Tokenization. </div><div>●<span style="font-size:7pt;"> </span>Experience with authorization protocols like XACML and UMA</div><div>●<span style="font-size:7pt;"> </span>Experience with Privileged Access Management</div><div>●<span style="font-size:7pt;"> </span>MFA, Duo, Okta SSO integration</div><div>●<span style="font-size:7pt;"> </span>Experience with API security and public cloud APIs &amp; integration</div><div>●<span style="font-size:7pt;"> </span>Understanding of information security architecture, mitigation of threats, and compensating controls. Deep familiarity with frameworks such as NIST 800-53, ISO 27001.</div><div>●<span style="font-size:7pt;"> </span>Experience with and proven methods for managing the information security incident lifecycle, including incident response, mitigation, after-action reporting, and mapping a path forward.</div><div>●<span style="font-size:7pt;"> </span>Strong understanding of static analysis, dynamic analysis and toolsets surrounding both. </div><div>●<span style="font-size:7pt;"> </span>Excellent oral and written communications skills for working with varying levels of technical experience.</div><div>●<span style="font-size:7pt;"> </span>Strong Programming experience in one of the high-level languages - Python/Perl/Go.</div><div>●<span style="font-size:7pt;"> </span>Proven ability to independently identify and resolve critical and complex issues through effective problem-solving skills</div><div>●<span style="font-size:7pt;"> </span>Ability to combine information from various sources into clear, concise technical documents that explain the background and procedures for detecting and mitigating risks.</div><div> </div><div>Preferred candidates will have a master's degree in computer science/Computer Engineering /Cyber security or in a relevant field to be successful.</div><div><br></div>
Anomali is an equal opportunity employer.
See more open positions at Anomali