- Company Name
- Techfellow Limited
- Job Title
- Security Engineer | Algorithmic Trading Strategy Leader
- Job Description
-
**Job Title**
Security Engineer | Algorithmic Trading Strategy Leader
**Role Summary**
Design, build, and maintain secure, automated detection and response pipelines for a global quantitative trading firm. Integrate security tooling into CI/CD, enhance log ingestion and data processing across hybrid environments, and embed observability into infrastructure and application lifecycles.
**Expectations**
- Deliver scalable, low‑latency security automation at the intersection of software engineering and cybersecurity.
- Collaborate closely with infrastructure, DevOps, and platform teams to evolve global security architecture.
- Support 24/7 operations with occasional weekend coverage for critical upgrades.
**Key Responsibilities**
- Design, develop, and maintain automated log collection, enrichment, and analysis pipelines (Python, Linux shell).
- Optimize log ingestion workflows and data transformation for high‑volume, low‑latency systems.
- Build automation scripts and integrations (primarily Python) to improve monitoring, alerting, and response.
- Engineer integrations between SIEM, SOAR, and observability platforms (Elastic Stack preferred; Splunk also relevant).
- Strengthen secure data processing and telemetry visibility, ensuring data integrity and detection coverage.
- Contribute to CI/CD pipeline development for security tooling and automation workflows.
- Embed detection logic and observability early in the software lifecycle through close collaboration with infrastructure and DevOps teams.
- Fine‑tune DLP and UEBA frameworks to detect behavioral anomalies and protect intellectual property.
- Support the development of security automation frameworks to reduce manual effort and improve accuracy.
- Participate in operational support rotations during business hours; occasional weekend coverage for critical upgrades.
**Required Skills**
- 5–8 years of professional experience in security engineering, detection engineering, or adjacent security/infrastructure roles.
- Strong hands‑on Linux skills (shell, system diagnostics, vulnerability investigation).
- Proficiency in Python (or comparable language) for automation, data processing, and system integration.
- Expertise with Elastic Stack (Elasticsearch, Logstash, Kibana) for log ingestion, search, and analytics; Splunk or other SIEM experience valued.
- Understanding of log processing pipelines, event correlation, and data normalisation across distributed systems.
- Familiarity with CI/CD pipelines and workflow automation, integrating security controls into build and deployment.
- Knowledge of network fundamentals, telemetry pipelines, and security data modelling.
- Strong analytical mindset, problem‑solving orientation, focus on efficiency and scalability.
**Preferred Experience**
- Threat detection, custom rule creation, or tuning of existing alerts.
- Incident response and forensics experience in high‑performance or research‑led environments.
**Required Education & Certifications**
- Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
- Relevant security certifications preferred: CISSP, CEH, GCIH, or equivalent.