Job Description:
Key Responsibilities
- Multi-Cloud Log Ingestion & Analysis
- Write Python code to fetch and normalize logs via AWS/Azure/GCP APIs (e.g., S3, Storage Queues, Pub/Sub)
- Parse, cleanse, and aggregate diverse log types (DNS, proxy, Orca, Uptycs, NSG flow logs, etc.)
- Identify data quality issues, annotate metadata, and document remediation steps
- Interactive Visualization
- Build reusable Plotly Dash components (heatmaps, time-series, geospatial maps) that allow security teams to drill into anomalies
- Annotate key events and embed insights for non-technical stakeholders
- Infrastructure as Code
- Develop Terraform modules to provision logging infrastructure in AWS (S3, Kinesis), Azure (Storage Accounts, Log Analytics), and GCP (Cloud Storage, Pub/Sub)
- Configure remote state backends with locking and integrate secrets in secure stores (Key Vault, Secrets Manager)
- Configuration Automation (Nice to have)
- Create Ansible roles/playbooks to provision and configure Ubuntu (or container) environments, install dependencies, deploy code, and run analyses
- Securely manage service principal or IAM credentials via Ansible Vault or environment variables
- Security Best Practices
- Apply least-privilege principles when assigning IAM/RBAC roles
- Understand threat models for log data streams (e.g., log injection, tampering, retention) and recommend hardening measures
- Collaborate with Ops to tune alert thresholds and response workflows
Required Qualifications
- 4+ years professional Python development experience
- Demonstrated ability to work with AWS, Azure, and GCP SDKs/APIs for storage, messaging, and compute
- Strong Plotly or similar interactive visualization skills
- Proven Terraform expertise across at least two cloud providers, with remote state and secret management
- Experience parsing and making sense of security logs (e.g., DNS queries, proxy logs, NSG flows, Orca/Uptycs outputs)
- Familiarity with security concepts and best practices (RBAC, least privilege, log integrity, etc.)
- Comfortable with Git-based workflows and CI/CD pipelines
Preferred Qualifications
- Prior experience building security or SIEM dashboards
- Containerization (Docker) and orchestration (Kubernetes/EKS, etc) skills
- Hands-on with monitoring/alerting tools (Prometheus, Grafana, etc)
- Familiarity with mocking and testing frameworks (pytest, moto, etc)
- Bachelor s degree in Computer Science, Engineering, or related field (or equivalent experience)
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .