Elasticsearch Engineer
Phoenix, Maricopa County, Arizona, 85003, USA
Listed on 2026-01-12
-
Engineering
Systems Engineer, Data Engineer -
IT/Tech
Systems Engineer, Data Engineer
Job Details
Level: Experienced
Job Location: Remote or - Phoenix, AZ 85004
Position Type: Full Time
Salary Range: $ - $ Salary/year
Travel Percentage: None
Job Shift: Standard (8AM to 5PM)
SummaryThe Elasticsearch Engineer will continuously improve and scale the Elasticsearch infrastructure that powers our high-profile, high-visibility cybersecurity and risk-management platform. You will own the Elasticsearch clusters (provisioning, upgrades, backup/restore, and troubleshooting) managed with Ansible, and you will design, evolve, and operate data‑ingest pipelines plus Elastic Fleet policies and integrations using Ansible.
This is a full-time, remote position. Rotation on‑call hours required.
What You’ll Do- Meet professional obligations with efficient work habits—hit deadlines, honor schedules, and coordinate resources/meetings effectively.
- Build strong cross‑functional relationships with Sec Ops, SRE/Platform, Dev, and Compliance.
- Maintain a professional image and adhere to all company policies/procedures.
- Produce clear runbooks, diagrams, and training for junior staff; lead knowledge‑shares.
- Participate in and contribute to collaborative engineering/design reviews.
- Plan and execute zero/minimal downtime Elasticsearch cluster upgrades with rollback and validation steps.
- Implement and test cluster backups/restores
; regularly perform DR exercises. - Diagnose and resolve cluster issues (performance, shards, mappings, ILM, security).
- Create and maintain Elasticsearch ingest pipelines parsing (Grok, processors, ECS alignment, Painless).
- Create and maintain index/component templates, ILM and SLM policies.
- Create and maintain Elastic Agent integrations via Ansible
, adapting data to Elastic Common Schema. - Build cluster, agent, and data ingest monitoring & alerting (throughput, latency, drop/error rates) with dashboards Kibana and Elast Alert; respond to incidents.
- Capacity planning and performance tuning.
- Own OS configuration management for Elastic nodes using Ansible (idempotent playbooks, CI validation).
- Partner with Security to improve data quality, normalization, and retention policies.
- “Other duties as assigned” in support of platform reliability and data integrity.
Minimum Qualifications
- High School Diploma or GED equivalent,
required
. - Elastic Certified Engineer (ECE) or equivalent knowledge,
required
. - 2+ years hands‑on Elasticsearch engineering in production,
required
. - Ansible experience for automated configuration management,
required
. - Extensive experience with Grok patterns and ingest pipeline parsing.
- Experience with Git Hub (PR workflow, code reviews, Actions/CI).
- Some programming experience to be able to comprehend and troubleshoot existing Power Shell and Python scripts.
- ETL/data‑engineering experience outside Elastic (e.g., Kafka, Fluent Bit, Airflow).
- Programming in Bash
, Python, Power Shell, Ruby or Go for tooling, automation, and QA. - Security certifications (e.g.,
CISSP, CISM, CISA, Security+, CEH
). - Exposure to Elastic security features, RBAC, TLS, PII handling.
- Experience with Elastic’s tooling such as Rally.
- Familiarity with ECS, ILM, SLM, Hot‑Warm‑Cold architectures, index and component templates, data stream and concrete index strategies.
- Experience with Linux hardening, systemd, and performance tuning for Elastic nodes.
- Observability practices (SLOs, error budgets), and metrics/logs/traces integration.
Elasticsearch, Kibana, Fleet, Elastic Agent, Grok. Painless, Ansible, Git, Linux, SSH, TLS/PKI;
Python, Power Shell, Vault, Consul.
- Ability to create and manage custom pipelines with strict adherence to the Elastic Common Schema.
- Zero‑defect execution of at least one cluster upgrade with validated rollback plan.
- Backups & restores documented and tested; RPO/RTO objectives met.
- Pipeline error rate and data latency within defined SLOs; data quality KPIs improved.
- Ansible playbooks and runbooks documented
, peer‑reviewed, and CI‑validated. - Measurable reduction in MTTR for Elastic‑related incidents.
Trapp Technology and Armor Point take pride in a workplace defined by positivity, respect, and collaboration – where…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).