Please note this role has several openings from the junior to expert level that range from 2-16 YOE with a bachelors degree
Demonstrated experience with cloud monitoring technologies such as Nagios, Splunk, Grafana, Cloudwatch, and Cloudtrail.
Demonstrated experience with managing Linux, UNIX, and Windows operating systems.
Demonstrated experience implementing cross environment data feeds.
Demonstrated experience with security best practices to include mitigating security vulnerabilities, automating lockdowns, and documenting security configuration.
Demonstrated experience automating system administration tasks using Linux scripting and Python.
Demonstrated experience with software provisioning, configuration management, and application-deployment tool enabling infrastructure as code using Ansible or a tool like puppet, Chef or Salt.
Demonstrated experience working with Terraform, Docker, Kubernetes
Demonstrated experience with commercial cloud platforms
Demonstrated database experience, including knowledge of SQL and NoSQL, and related data stores such as Postgres.
Demonstrated experience with open-source technology, software development, and system engineering.
Demonstrated experience working tandemly with a team of engineers or independently.
Demonstrated experience creating, managing, and administering Certificate Authority (CA) and Public Key Infrastructure (PKI) certs.
Demonstrated experience engineering, building, administering, and managing a cloud-based environment.
Demonstrated hands-on experience engineering the design, build, and configuration of Linux servers.
Demonstrated hands-on experience performing administration, troubleshooting, patching, and support of Linux servers.
Demonstrated hands-on experience performing risk analysis for proposed IT infrastructure changes.
Demonstrated hands-on experience performing system monitoring and analysis, including root cause analysis of system faults and outages.
Demonstrated experience of automating deployment of security tools using Chef and GitHub.
Demonstrated experience with computer forensics, network security and defense, and incident management.
Demonstrated experience in network security architecture to include topology, protocols, components, and principles.
Demonstrated experience with multiple Operating Systems (OS), to include Microsoft Windows, Red Hat, Ubuntu, and CentOS.
Demonstrated experience utilizing the Linux Command Line Interface (CLI).
Demonstrated experience using Splunk Security Event Information Management (SIEM) pipeline response systems, Splunk Enterprise, Splunk Enterprise Security (ES), and Splunk SOAR.
Demonstrated experience creating and deploying Security Orchestration and Response (SOAR) playbooks.
Demonstrated experience creating correlation searches and notable events.
Demonstrated experience executing and automating security scans using SecDevOps methods for Rumble and Nexpose scans.
Demonstrated experience supporting Endpoint Detection and Response (EDR) tools, such as FireEye EDR, Microsoft Defender for Endpoint, Microsoft Defender for Office365, AWS GuardDuty, AWS CloudFormation, AWS Serverless, API Gateway, and Azure Event Hub.
Demonstrated experience operating within a heuristic agile scrum framework.
Demonstrated experience using JIRA methodologies such as Stories, Epics, and Initiatives.