Job Description:
Work as part of a team developing methods to quickly reference systems of record (SOR's), systems of origin (SOO's) and other available data stores for a comprehensive reliable and timely view of the Clients attack surface and vulnerability exploitability potential, with the goal of enabling answers to the following three questions as quickly as possible.
Do we, have it?
Are we vulnerable?
Is it exploitable?
The Attack Surface Visibility and Analysis team is responsible for data mining efforts to identify and understand the firm's Attack Surface.
You will leverage tools like Hue (Hive and Impala), Power BI, SQL Server, Cloudera, .NET, and Python to design, create and prepare queries and visualizations for other Global Information Security groups, under the supervision of the Attack Surface Visibility and Analysis Manager.
A successful candidate will be team oriented, collaborative, persistent, analytical, and detail oriented such that development efforts and deliverables meet deadlines, accuracy, and specified purpose.
Typically, 5-8 years of IT experience with a minimum of 3+ years of those focused on IT system development work with large data stores.
Candidate must also be able to perform analysis against result sets to identify gaps, trends, or actionable information.
Required Skills:
Hands-on experience with large datasets and tools including data ingestion (batch real time), transformation and delivery.
5+ years of professional experience writing queries and analyzing output or closely related roles.
Power BI
SQL development
MS-Reporting Services (SSRS)
MS-Integration Services (SSIS)
Hue (Hive and Impala)
NET
IIS (Internet Information Services)
JavaScript
Excellent research skills - able to identify relevant data sources for information about Client technologies, gain an understanding of how things work and be willing to dig in and help identify usage throughout the firm.
Strong analytical skills/problem solving/conceptual thinking.
Desired Skills:
Python development (front-and back-end)
Knowledge of information security concepts, research tools, and products
Ability to work with Technical and Non-Technical business owners.
Any Graduate