Phoenix Cyber is looking for security focused Python programmers to help develop custom plugins and 3rd party integrations for a commercial-off-the-shelf cybersecurity software product. The work involves designing, developing, and implementing data models, index structures, and storage strategies; ingesting/indexing processes and transforming/normalizing data to common standards using log aggregation tools (e.g., Elasticsearch and Splunk); enriching data upon ingest and querying; and creating queries against big data.
This is a 100% remote, work-from-home position anywhere in the continental United States.
Requirements:
- Minimum 5 years of strong Python programming experience
- Experience in authoring and developing Python libraries
- Experience using REST and SOAP APIs to query and update data across multiple third-party applications
- Experience with Git, CI/CD and other development tools
- Experience with cloud infrastructure and networking in AWS and/or Azure
- Degree in a STEM related discipline and/or a minimum 5 years of cybersecurity experience
Nice to have:
- Experience with SOAR tools, Swimlane, Cyber Triage, Phantom
- Experience with the ELK (Elasticsearch, Logstash, Kibana) stack, Elastic Cloud on Kubernetes (ECK), Kafka, Beats, and/or Splunk
- Experience modeling with databases (relational/non-relational), especially MongoDB
- Configuration management experience with Ansible/Terraform/Chef/Puppet
- Experience with container services (Docker, Kubernetes, etc.)
- Linux administration experience
- Active (ISC)2 CISSP certification
Phoenix Cyber is a national provider of cybersecurity engineering services, operations services, sustainment services and managed security services to organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations team.
Phoenix Cyber is an equal opportunity employer and complies with Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, the Vietnam Era Veteran's Readjustment Assistance Act (VEVRAA), all amendments to these regulations, and applicable executive orders, federal, and state regulations. Applicants are considered without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, and/or veteran status.
Phoenix Cyber participates in E-Verify to confirm the employment eligibility of all newly-hired employees. To learn more about E-Verify, including your rights and responsibilities, go to https://www.e-verify.gov/
Top Skills
What We Do
Phoenix Cyber is a national provider of cybersecurity engineering, operations, and sustainment services to enterprise and government organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations center. Our team comprises senior cybersecurity consultants and engineers with expertise in architecting results-oriented, cybersecurity frameworks; and the operational processes to ensure accurate incident detection, enrichment, and response. Our unique blend of security automation, orchestration, and proven best practices differentiates Phoenix-architected solutions from traditional cybersecurity services.
Cybersecurity Services
- Security Engineering (plan, architect, design, implement, integrate, document, and optimize)
- Security Operations (identify, protect, detect, respond, recover processes and best practices)
- Sustainment Services (manage, maintain, update, upgrade, optimize, support)
- Federal Government Services (contracts with U.S. Navy, FAA, DLA, and CIO-SP3)
Capabilities
- Data Protection
- Endpoint Security
- Network Security
- Perimeter Security
- Phishing Detection and Response
- Security Orchestration, Automation, and Response (SOAR)
- SIEM
- Threat Intelligence
- Threat Hunting
Security Tools
AWS, Microsoft, Swimlane, UiPath