Senior Engineer – Security Visibility Infrastructure

TargetBrooklyn Park, MN
1d$98,000 - $176,000Hybrid

About The Position

Target is an iconic brand, a Fortune 50 company and one of America’s leading retailers. Target as a tech company? Absolutely. We’re the behind-the-scenes powerhouse that fuels Target’s passion and commitment to cutting-edge innovation. We anchor every facet of one of the world’s best-loved retailers with a strong technology framework that relies on the latest tools and technologies—and the brightest people—to deliver incredible value to guests online and in stores. Target Technology Services is on a mission to offer the systems, tools and support that guests and team members need and deserve. Our high-performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. We drive industry-leading technologies in support of every angle of the business, and help ensure that Target operates smoothly, securely and reliably from the inside out. As a Senior SIEM Engineer, you will: Own and improve end-to-end log ingestion into Google SecOps (formerly Chronicle)—from source onboarding through reliable shipment—so downstream teams can power search, alerting, enrichment, and investigations. Design and deliver scalable improvements to ingestion pipelines, integrations, and data validation, including feed health signals, shipment validations, and other meta-attributes that ensure end-to-end feed reliability. Partner with and build strong working relationships across Threat Management Engineering, Threat Detection & Operations, Cyber Threat Intelligence, and CSIRT to deliver high-quality, backward-compatible changes to large-volume, high-criticality data feeds and SecOps integrations. Lead troubleshooting and root-cause analysis across log pipelines and SIEM integrations (including other SIEM platforms) as part of a shared 24/7 on-call rotation; implement preventative mechanisms through monitoring, runbooks, and automation. Build and enhance ingestion integrations and operational tooling using Python and regular expressions for parsing, validation, transformations, and schema evolution across standard and non-standard formats (e.g., JSON, Syslog, CEF, CSV/TSV). Develop monitoring and alerting aligned to platform SLOs/SLAs, improving completeness, timeliness, and quality while reducing incident recurrence and MTTR. Collaborate across teams to prioritize work, unblock partners, and continuously improve telemetry quality and platform performance. In this role, you are a technical contributor responsible for designing, building, and operating reliable log ingestion capabilities that enable the core cybersecurity mission at Target. You bring strong troubleshooting and systems thinking, developing deep understanding of the platform’s architecture, interfaces, and failure modes to drive scalable improvements across ingestion pipelines, integrations, feed health, and shipment validation. You lead investigations from signal to root cause, communicate clearly during incidents, and follow through with durable preventative fixes via observability, runbooks, and automation. You take broad end-to-end ownership—raising operational readiness so the platform can rapidly pivot to meet shifting cybersecurity landscape, priorities, and incident demands. You consistently produce high-quality code and operational changes, and you collaborate across teams to align on standards, unblock delivery, and continuously improve telemetry quality and platform performance. Core responsibilities of this job are described within this job description. Job duties may change at any time due to business needs.

Requirements

  • 4-year degree in Computer Science (or related field) or equivalent practical experience
  • 3+ years of software development and/or platform engineering experience
  • Proven track record building and operating systems in a cloud environment (public cloud required)
  • Proficiency in Python
  • Proficiency with regular expressions for parsing, extraction, and validation
  • Experience integrating systems using APIs (including authentication/authorization concepts)
  • Experience ingesting, transforming, and validating log/event data across standard and non-standard formats (e.g., JSON, Syslog, CEF, CSV/TSV), including schema changes and backwards compatibility
  • Demonstrated troubleshooting and root-cause analysis skills in production environments, including follow-through on preventative fixes (monitoring, runbooks, automation)
  • Understanding of distributed systems fundamentals and common resilience patterns (timeouts, retries, idempotency)
  • Experience migrating services or data flows between provider platforms (e.g., on-prem ↔ cloud)
  • Willingness to participate in a shared 24/7 on-call rotation

Responsibilities

  • Own and improve end-to-end log ingestion into Google SecOps (formerly Chronicle)—from source onboarding through reliable shipment—so downstream teams can power search, alerting, enrichment, and investigations.
  • Design and deliver scalable improvements to ingestion pipelines, integrations, and data validation, including feed health signals, shipment validations, and other meta-attributes that ensure end-to-end feed reliability.
  • Partner with and build strong working relationships across Threat Management Engineering, Threat Detection & Operations, Cyber Threat Intelligence, and CSIRT to deliver high-quality, backward-compatible changes to large-volume, high-criticality data feeds and SecOps integrations.
  • Lead troubleshooting and root-cause analysis across log pipelines and SIEM integrations (including other SIEM platforms) as part of a shared 24/7 on-call rotation; implement preventative mechanisms through monitoring, runbooks, and automation.
  • Build and enhance ingestion integrations and operational tooling using Python and regular expressions for parsing, validation, transformations, and schema evolution across standard and non-standard formats (e.g., JSON, Syslog, CEF, CSV/TSV).
  • Develop monitoring and alerting aligned to platform SLOs/SLAs, improving completeness, timeliness, and quality while reducing incident recurrence and MTTR.
  • Collaborate across teams to prioritize work, unblock partners, and continuously improve telemetry quality and platform performance.

Benefits

  • In addition to your pay, Target cares about and invests in you as a team member, so that you can take care of yourself and your family.
  • Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves.
  • Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation.
  • Find competitive benefits from financial and education to well-being and beyond at https://corporate.target.com/careers/benefits.
  • We care about and invest in you as a team member, so that you can take care of yourself and your family.
  • Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves.
  • Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation.
  • Find competitive benefits from financial and education to well-being and beyond at https://corporate.target.com/careers/benefits.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service