Datum job openings in IT

EMPLOYMENT DETAIL

We provide highly competitive benefits, flexible contracting, opportunities for growth and a dedication to employee satisfaction.

Back to job list

Dynatrace APM Engineer #32447

 
Location: Atlanta, Georgia
ID Number: #32447

Dynatrace APM Engineer
Long-Term Contract

Atlanta, GA or Eagan, MN

Qualifications:
6 + years of experience required
 

Dynatrace APM Engineer

Sr. Systems Engineer (Application Performance Monitoring) Use Dynatrace APM and UEM tools to optimize application performance and identify bottlenecks in web applications and provide solutions. Demonstrate thorough knowledge and awareness of application performance issues in a complex multi-tiered environment.

  • Knowledge of Customer Experience Management, Application Performance monitoring and log analytics tools like Splunk, Dynatrace Synthetic, Dynatrace Appmon, CA APM, Prometheus etc., is highly desired.
  • On-board new application into Dynatrace, profile configuration, agent setup, instrumentation.
  • Ability to do requirement gathering and target environment analysis from an APM perspective.
  • Hands-on implementation experience in Dynatrace On-Premise and SaaS-based solutions.
  • Experience on Configuration and customization of Dynatrace solution.
  • Ability to cross-train peers with tool usage and assist in creation of best-practices.
  • Coordinate with various project stakeholders and partner support teams to ensure seamless tool deployment.
  • Partner with application development, application support, and other IT infrastructure resources to define measurement frameworks, develop KPI's and performance dashboards Skills: key words such as JAVA, excel etc.

1. Clear understanding of highly distributed applications and how they interconnect and communicate, from the browser or mobile app, through the cloud, CDNs, and third parties, into the data center, and through to the back end

2. Ability to have meaningful discussions around technical concepts such as object-oriented fundamentals, web application infrastructure, memory management and GC, threading, frameworks, design patterns, exception handling, messaging, reflection, aspect-oriented programming, dependency injection, etc.

3. Strong Linux Administration skills

4. Strong Windows Administration skills

5. Intermediate Java and Python scripting skills

Responsibilities:
Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization’s information assets. Also responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. '

-Works with the technical team to recover data after a security breach.

-Configures and installs firewalls and intrusion detection systems.

-Develops automation scripts to handle and track incidents.

-Investigates intrusion incidents, conducts forensic investigations and mounts incident responses.

-Delivers technical reports and formal papers on test findings.

-Installs firewalls, data encryption, and other security measures.

-Maintains access by providing information, resources, and technical support.

-Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements.

-Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.

-Accomplishes information systems and organization mission by completing related results as needed.

-Builds, deploys, and tracks security measurements for computer systems and networks.

-Mitigates security vulnerabilities by implementing applicable solutions and tools.

-Performs vulnerability testing, risk analyses, and security assessments.

-Collaborates with colleagues on authentication, authorization, and encryption solutions.

-Tests security solutions using industry standard analysis criteria.

-Responds to information security issues during each stage of a project’s lifecycle.

-Performs risk assessments and testing of data processing systems.

-Establishes system controls by developing framework for controls and levels of access; recommending improvements

-Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements.

-Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements.

'-Determines the sensitivity of the data in order to recommend the appropriate security needs.

-Develops proposals for, and consider cost effective equipment options to satisfy security needs.

-Communicates with the technical team, management team and users companywide if data security is breached.

-Designs infrastructure to alert the technical team of detected vulnerabilities.

-Evaluates new technologies and processes that enhance security capabilities.

-Supervises changes in software, hardware, facilities, telecommunications and user needs.

-Defines, implements, and maintains corporate security policies.

-Analyzes and advises on new security technologies and program conformance.

-Creates, tests, and implements network disaster recovery plans.

-Recommends security enhancements and purchases.

-Trains staff on network and information security procedures.

-Develops security awareness by providing orientation, educational programs, and on-going communication.

-Recommends modifications in legal, technical and regulatory areas that affect IT security.

 

“All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.”

Recruiter
Hi I'm
Frantz Canel
Interested in this job?
Act now!
  • Max. file size: 128 MB.
  • Hidden
  • Hidden
  • Self Identification

  • Please mark the box that describes the race/ethnicity category with which you primarily identify.