Must Have Technical/Functional Skills
Java, Python, SQL, Cyber Security, Akamai
Experience Required
• Proven experience in analyzing production issues and come with a RCA report.
• Good to have knowledge of Akamai
• Should have experience in triaging issues using application, security logs
• Should have experience in monitoring tools like New Relic
• Technical expertise or knowledge in e-commerce application security, design, and architecture.
• Familiarity with SRE principles and practices.
• Proficiency in Java, Python, SQL, and data querying.
• Excellent analytical and problem-solving skills.
• A proactive approach to learning new technologies and staying current with industry trends.
Roles & Responsibilities:
• Analyze Bot Attacks: Independently analyze and respond to bot attacks in real-time, ensuring minimal disruption to our services.
• Pattern Analysis: Identify and analyze attack patterns using Akamai, security logs, and other tools. Query data across various systems to gain comprehensive insights into attack vectors.
• Technology Proficiency: Work with technologies such as Java, Python, SQL. work with monitoring tools like Dataset (centralized logging) and New Relic (observability)
• Technical Expertise: Utilize your deep understanding of e- commerce applications to contribute to the design and implementation of security features on client platform.
• SRE Practices: Apply Site Reliability Engineering (SRE) principles to
enhance the reliability, scalability, and security of our infrastructure.
• Continuous Learning: Stay updated with the latest security trends, SRE practices, and technologies. Be willing to learn and implement new tools and techniques.
• Analytical Skills: Employ strong analytical skills to dissect complex security issues and develop effective mitigation strategies. Create detailed reports and alerts based on system logs and data analysis.
• Security Assessment: Conduct thorough security assessments to identify potential vulnerabilities in our features and infrastructure. Propose and drive conversations on necessary feature changes to enhance security.
• Vendor Collaboration: Lead discussions with vendors like Akamai and Riskified, ensuring that we leverage their solutions effectively to bolster our security posture.