Job Description:
Key Responsibilities
Multi-Cloud Log Ingestion & AnalysisWrite Python code to fetch and normalize logs via AWS/Azure/GCP APIs (e.g., S3, Storage Queues, Pub/Sub)Parse, cleanse, and aggregate diverse log types (DNS, proxy, Orca, Uptycs, NSG flow logs, etc.)Identify data quality issues, annotate metadata, and document remediation stepsInteractive VisualizationBuild reusable Plotly Dash components (heatmaps, time-series, geospatial maps) that allow security teams to drill into anomaliesAnnotate key events and embed insights for non-technical stakeholdersInfrastructure as CodeDevelop Terraform modules to provision logging infrastructure in AWS (S3, Kinesis), Azure (Storage Accounts, Log Analytics), and GCP (Cloud Storage, Pub/Sub)Configure remote state backends with locking and integrate secrets in secure stores (Key Vault, Secrets Manager)Configuration Automation (Nice to have)Create Ansible roles/playbooks to provision and configure Ubuntu (or container) environments, install dependencies, deploy code, and run analysesSecurely manage service principal or IAM credentials via Ansible Vault or environment variablesSecurity Best PracticesApply least-privilege principles when assigning IAM/RBAC rolesUnderstand threat models for log data streams (e.g., log injection, tampering, retention) and recommend hardening measuresCollaborate with Ops to tune alert thresholds and response workflowsRequired Qualifications
4+ years professional Python development experienceDemonstrated ability to work with AWS, Azure, and GCP SDKs/APIs for storage, messaging, and computeStrong Plotly or similar interactive visualization skillsProven Terraform expertise across at least two cloud providers, with remote state and secret managementExperience parsing and making sense of security logs (e.g., DNS queries, proxy logs, NSG flows, Orca/Uptycs outputs)Familiarity with security concepts and best practices (RBAC, least privilege, log integrity, etc.)Comfortable with Git-based workflows and CI/CD pipelinesPreferred Qualifications
Prior experience building security or SIEM dashboardsContainerization (Docker) and orchestration (Kubernetes/EKS, etc) skillsHands-on with monitoring/alerting tools (Prometheus, Grafana, etc)Familiarity with mocking and testing frameworks (pytest, moto, etc)Bachelor’s degree in Computer Science, Engineering, or related field (or equivalent experience)At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.