Posted in

Lead Cyber Defense Threat Analytics Engineer

Lead Cyber Defense Threat Analytics Engineer

CompanyNike
LocationBeaverton, OR, USA
Salary$119400 – $267500
TypeFull-Time
DegreesBachelor’s
Experience LevelSenior

Requirements

  • Bachelor’s degree in Computer Science or related field. Will accept any suitable combination of education, experience and training
  • Five years of information technology experience with preferred three years in a cyber security related role
  • Extensive experience in data engineering and data lakehouse development, particularly with Databricks
  • Proficient in programming and scripting languages such as Python, JavaScript, and Go
  • Skilled in AWS Cloud engineering and CI/CD pipeline development
  • Experience developing and supporting full-stack applications
  • Familiar with search platforms, including Splunk, Devo, and SumoLogic, as well as Security Information and Event Management (SIEM) tools
  • Strong written and oral communication skills
  • Experience collaborating with other internal or external organizations regarding security policy and standards violations, security controls failure and incident response situations
  • Must be credible in keeping sensitive data confidential

Responsibilities

  • Automate and optimize data ingestion, transformation, and storage processes while integrating scalable AI/ML models into cyber security systems to enhance detection workflows
  • Develop reliable databases and distributed systems for managing complex security datasets, ensuring scalability and efficiency across diverse environments
  • Collaborate with Detection Engineers to implement machine learning algorithms and advanced analytics tools for improved threat identification and validation processes

Preferred Qualifications

  • Experience with implementing GenAI and ML for Cyber Security use cases
  • Certified Big Data Administrator/Architect
  • Knowledge of machine learning and anomaly detection techniques
  • Experience working with insider threat teams identifying or triaging suspicious activity
  • Experience demonstrating automated server configuration tools (such as Puppet or Chef)
  • Consistent track record of success in fast paced organizations with sophisticated technology applications
  • One or more of the following professional certifications: Certified Information Security Professional (CISSP), Global Information Assurance Certifications (GIAC)
  • Working in an agile environment