Join our companies in their quest to drive powerful, positive, change that endures.

Principal Production Security Engineer (Poland Remote)

Anomali

Anomali

Warsaw, Poland
Posted on Thursday, February 2, 2023
<div><b style="font-size:13pt;">Principal Production Security Engineer</b></div><div>Anomali is looking for a hands-on senior cloud security engineer to improve and maintain our security posture. We are looking for someone with 15+ years’ experience in Security with a deep understanding of various technologies in the security domain.</div><div><br></div><div>This role will require someone passionate about DevSecOps, with an accomplished background in secure software engineering, with strong exposure to cloud platform security practices. A passion for building secure world-class infrastructure and tooling in terms of reliability, scalability, and accessibility will be paramount.</div><div><br></div><div>The person in this role will help implement a capability driven, <b>highly automated</b> approach to our <b>security operations, monitoring &amp; detection, incident response capabilities</b>, and our overall information security risk management program efforts.</div><div><br></div><div>A successful person in this role will be an individual who is an avid problem solver with a background in <b>systems design, architecture and compliance</b> and is one who loves an environment focused on software engineering practice excellence, code reviews and regular pairing.</div><div><br></div><div>Possess excellent communication skills, as well as being happy to collaborate with others, guiding and mentoring where needed.</div><div><br></div><div>A strong background with CI/CD pipelines and security related tooling</div><div> </div><div><b>Responsibilities:</b></div><div> </div><div>●<span style="font-size:7pt;"> </span>Administration of Certificate Lifecycle Management Services and infrastructure</div><div>●<span style="font-size:7pt;"> </span>Administration of Encryption and Key Management Services and infrastructure</div><div>●<span style="font-size:7pt;"> </span>Administration of Key Vaults, Cloud Cryptographic and PKI Services</div><div>●<span style="font-size:7pt;"> </span>Multi-cloud IAM integration and administration</div><div>●<span style="font-size:7pt;"> </span>Integration, validation and automation across cryptographic frameworks</div><div>●<span style="font-size:7pt;"> </span>Evaluate cryptographic tools, products and frameworks</div><div>●<span style="font-size:7pt;"> </span>Troubleshoot cryptographic anomalies, and issues across the enterprise</div><div>●<span style="font-size:7pt;"> </span>Negotiating and liaising with different technology teams within the organization.</div><div>●<span style="font-size:7pt;"> </span>Facilitate and embed security controls across our infrastructure and into our CICD pipelines.</div><div>●<span style="font-size:7pt;"> </span>Set up monitoring dashboards, alerts, log management, and other security operations capabilities by utilizing industry standard tools and platforms (SIEMs/XDR) alongside our currently deployed toolsets/platforms.</div><div>●<span style="font-size:7pt;"> </span>Help enhance Incident Response capabilities including Runbooks, reputation management, etc.</div><div> </div><div> </div><div><b>Requirements: </b></div><div><b>Specific Experience needed to be successful in this role:</b></div><div> </div><div>●<span style="font-size:7pt;"> </span>Minimum 10 years of experience in Security (Dev/SecOps) with a deep understanding of various technologies in the security domain</div><div>●<span style="font-size:7pt;"> </span>Expertise in secure software engineering and cloud platform security: systems design, architecture, &amp; compliance</div><div>●<span style="font-size:7pt;"> </span>Knowledge of IAM concepts, including but not limited to provisioning, RBAC, SCIM, LDAP, and governance and authorization standards</div><div>●<span style="font-size:7pt;"> </span>Experience with identity governance platforms</div><div>●<span style="font-size:7pt;"> </span>Experience with federated identity platforms/products</div><div>●<span style="font-size:7pt;"> </span>Knowledge of current Identity providers and protocols such as Oauth 2.0, OpenID Connect, and SAML 2.0. Tokenization. </div><div>●<span style="font-size:7pt;"> </span>Experience with authorization protocols like XACML and UMA</div><div>●<span style="font-size:7pt;"> </span>Experience with Privileged Access Management</div><div>●<span style="font-size:7pt;"> </span>MFA, Duo, Okta SSO integration </div><div>●<span style="font-size:7pt;"> </span>Experience with API security and public cloud APIs &amp; integration</div><div>●<span style="font-size:7pt;"> </span>Understanding of information security architecture, mitigation of threats, and compensating controls. Deep familiarity with frameworks such as NIST 800-53, ISO 27001.</div><div>●<span style="font-size:7pt;"> </span>Experience with and proven methods for managing the information security incident lifecycle, including incident response, mitigation, after-action reporting, and mapping a path forward.</div><div>●<span style="font-size:7pt;"> </span>Strong understanding of static analysis, dynamic analysis and toolsets surrounding both. </div><div>●<span style="font-size:7pt;"> </span>Excellent oral and written communications skills for working with varying levels of technical experience.</div><div>●<span style="font-size:7pt;"> </span>Strong Programming experience in one of the high-level languages - Python/Perl/Go.</div><div>●<span style="font-size:7pt;"> </span>Proven ability to independently identify and resolve critical and complex issues through effective problem-solving skills</div><div>●<span style="font-size:7pt;"> </span>Ability to combine information from various sources into clear, concise technical documents that explain the background and procedures for detecting and mitigating risks.</div><div> </div><div><span style="font-size:11pt;">Preferred candidates will have a master's degree in computer science/Computer Engineering /Cyber security or in a relevant field to be successful.</span></div><div><br></div><div><br></div><div> <b style="font-size:9pt;">Equal Opportunities Monitoring </b><span style="font-size:9pt;">It is our policy to ensure that all eligible persons have equal opportunity for employment and advancement on the basis of their ability, qualifications and aptitude. We select those suitable for appointment solely on the basis of merit without regard to an individual's disability, race, color, religion, sex, sexual orientation, gender identity, national origin, age, or status as a protected veteran. Monitoring is carried out to ensure that our equal opportunity policy is effectively implemented. If you are interested in applying for employment with Anomali and need special assistance or accommodation to apply for a posted position, contact our Recruiting team at </span><a href="mailto:recruiting@anomali.com" style="font-size:9pt;" class="postings-link">recruiting@anomali.com</a><span style="font-size:9pt;">.</span> </div>
Anomali is an equal opportunity employer.
See more open positions at Anomali