Principle statements
Careers
Realize your career path with us!
About INTEGRA Solution?
About INTEGRA Solution? INTEGRA Solution is established in 2004 and since the very beginning we’ve been dedicated to managing the Digital Risk for the regulated industries. The company stands out with its dedication to IT Service and Security services with many years of hands-on experience in a host of industries, delivering numerous IT service and security solutions to banking, telecom, government and supporting industries. From our products to our team members, INTEGRA Solution is centered around relationships.
Cybersecurity Data Science Analyst
What we are looking for
We are looking for Data Science Developer/Analyst who are fluent in front-end technologies, but who are also confident to work on the server-side part of the stack. Relevant server-side experience includes design and development of APIs, implementation of data persistence logic and integration with third party services. We hire candidates who are fundamentally wired to connect – whether that's a business opportunity, an innovative customer solution, or a feat of data science engineering. We're looking for a talented person to join the INTEGRA Solution team and help us further the vision to help the world make sense of data.
This role will see you build key pieces of technology infrastructure that will be used by users all around the world. The experience of developing these privacy based solution is quite different from developing a typical website or e-commerce application. You'll be creating software platform that must scale and adapt to the diverse needs of all users. If you're interested in going to a deeper level of technical detail, this could be the role to gain that knowledge, and to explore new and challenging technologies beyond what you'll find in a typical end-user application. Production experience with several of the technologies we use is desirable but not essential. You should be comfortable working with Apachie Spark coding in JavaScript or Python and working with NoSQL databases like Neo4j or Neptune. Our engineers work in both remotely and in the office and most teams are split across the two, so you must be comfortable working as part of a distributed team. We use extensive testing, so proficiency with a range of approaches from unit-testing up to full-stack integration testing will be helpful. Do you like to solve advanced and complex cybersecurity data science problems? Are you looking for a deep technical career, solving the hardest problems in the industry? We are always looking for strong engineers to join our team. Whether you are a specialist in specific technologies, or have broad interests across the whole tech stack, we need your skills to build our product.
- We tackle challenges in:
- Cybersecuity data science
- Concurrency and parallelism
- Distributed systems and fault tolerance
- Performance tuning and benchmarking
- Cloud secuirty architecture and service design
- Site Reliability Engineering and cloud automation
- Continuous Integration and Continuous Delivery
- Graph algorithms and machine learning
DevSecOps Engineer
The Security Engineer guides the implementation and monitoring of enterprise wide information security management solutions and strives to enforce security best practices, policies, standards and guidance to ensure the safeguard of client proprietary data, ICT infrastructure and resources from internal and external threats. The Security Engineer is required to maintain an understanding of ITSM&SS services provided by INTEGRA Solution develop relationships with the clients to assist IT Service Management and Information Security in accomplishing goals of the enterprises.
- Evaluate the results from intrusion detection through monitoring, analyzing and reporting on all network for unwanted manipulation to systems, malicious network traffic, network attacks to sensitive data.
- Schedule and maintain security operations management of operating systems and network infrastructure components to provide security configurations, monitoring of centralized logging and routine maintenance through the use of administrative tools.
- Cooperate with enterprise incident handling team by detecting, analyzing and performing remediation on networks or systems, malicious entities that infect single or multiple hosts, unauthorized access without permission to application, data, networks, systems or other resources inappropriate usage that violates acceptable use policies.
- Classify malicious code as it pertains to the by identifying worms, viruses or attackers that attempt to breach systems by operating through proxies, anonymous dial-up accounts, wireless connections or illegal network access, monitoring preventive measures such as firewalls and other that provide real-time filtering and blocking.
English