Has strong knowledge of Hadoop, ecosystem, include HBase, hive, solr and others. Should understand Hadoop security control like Ranger, Knox, Kerbaros and others.
There are several tools we integrate such as Solr, Elastic Search, Your Neo4J for example.
Creates, maintains, revises and troubleshoots computing accounts and access. Develops and supports computing access management tools. Supports computing security audits. Develops and provides training on security and access requirements to support deployment of new applications. Documents and maintains procedures for access administration and audit processes. Researches processes, applications, systems and data to identify functional security requirements for data security and system design. Consults with customers to clarify and refine requirements. Interprets and translates requirements into functional specifications. Develops and executes tests to validate system functionality against specifications.
Ability to perform data investigation and data mining using Structured Query Language (SQL) to identify data marking and collaborate with data authors and policy offices (Global Trade Controls and Global Privacy Office).
Knowledge and experience in Information Protection standards and policies including administrative requirements for export of information governed by the International Traffic in Arms (ITAR) regulations and Export Administration Regulation.
Ability to develop procedure and policy process documentation to guide security implementation.
Ability to collaborate with developers to design authorization controls governing access to sensitive data.