Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Amazon Sr Security Engineer Identity Abuse Prevention 
United States, Texas, Austin 
398760375

26.06.2024
DESCRIPTION

In this role, you will leverage your knowledge in multiple domains to define elegant solutions to complex security questions. You will dig in to ambiguous issues spanning business and technical, networking, software, and physical security. You will work hands on with detection systems and vulnerability analysis tools to gather data and root-cause incidents. You will collaborate with both internal and external stakeholders to analyze weaknesses and recommend pragmatic solutions that achieve business requirements within an acceptable level of risk.
*Diverse Experiences*
Amazon Security values diverse experiences. Even if you do not meet all of the qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.*Why Amazon Security?*
*Inclusive Team Culture*
In Amazon Security, it’s in our nature to learn and be curious. Ongoing DEI events and learning experiences inspire us to continue learning and to embrace our uniqueness. Addressing the toughest security challenges requires that we seek out and celebrate a diversity of ideas, perspectives, and voices.*Training & Career Growth*
We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, training, and other career-advancing resources here to help you develop into a better-rounded professional.*Work/Life Balance*

BASIC QUALIFICATIONS

- Bachelor's degree
- • 8+ years of experience in identifying security issues and risks, and developing mitigation plans


PREFERRED QUALIFICATIONS

- 5+ years of experience in three or more of the following areas: identity and access management, cryptography, web and network protocols, data structures and algorithms, threat modeling, or vulnerability assessments