The cloud security technical Consultant helps design, deploy and operate a secure cloud application infrastructure that aligns with business needs. The position is responsible for supporting operational innovation and providing security direction to the business to elevate the company’s security posture within a cloud computing infrastructure. An advanced role, the cloud security technical consultant helps deliver applications at scale and with resiliency to support business initiatives. This person is also expected to possess administrative and troubleshooting skills, and be knowledgeable about architecture, engineering and design principles. In tandem with security leadership, this role consistently assess the threat landscape and adapts quickly to protect the business from risk. They must be highly technical and possesses at least 3-5+ years’ experience in security across a wide variety of security domains to include governance and compliance, cloud security architecture, with knowledge of software as a service (SaaS), infrastructure as a service (IaaS) and platform as a service (PaaS). o Develop and maintain secure, resilient enterprise-grade cloud processes in tandem with architects and system engineers. o Secure business applications and computing environments across public, private or hybrid cloud deployment models. o Protect business applications in compliance with privacy, security, business resiliency and compliance frameworks as defined in corporate policies. o Use of Azure security policies to enforce required resource configurations and general security protections. o Maintain a consistent, secure environment using configuration management solutions. Conduct rigorous oversight of security systems and security configuration administration to reduce risk to enterprise systems and accounts. o Apply the least privilege concept in evaluating and designing solutions for the cloud. o Assist with development, maintenance and utilization of scripts (e.g., Python, Ruby, etc.) to support custom extract, transform load (ETL) tools with a security focus for data flow. o Attend regular technical project and implementation meetings and serve as the security consultant to help guide secure application and infrastructure configurations. o Actively monitor, assess and recommend tactical and strategic initiatives based on new and emerging threats posing risk to cloud computing environments. o Manage remediation efforts after security assessment findings outline weaknesses requiring attention. o Document, formulate and enforce areas of security improvement that balance risk with business operations and do not diminish efficiencies or innovation. o Assist in maintaining strong oversight with cloud computing vendors and solution providers to safeguard against undue risk presented by external entities. Escalate to security management and business unit leads when points of weakness are discovered. o Stay apprised of current and proposed security changes impacting regulatory, privacy and security industry best practice guidance. Apply learned knowledge across key lines of business, including products, practices and procedures. o Attend and fully engage in change and project management meetings.
3+ years of experience in cybersecurity as a practitioner and with at least 1-2+ years exposure with one of the following; Amazon Web Services (AWS), Microsoft Azure or VMware.
• Bachelor's Degree preferred. • Strong Linux and Windows support skills. • Experienced in cloud networking architecture and cloud operations. • Experience with creation and maintenance of Azure security policies, both custom and built-in. • Familiarity with tools such as Git, Jenkins, Chef, Puppet and Salt. • Network and encryption experience, including virtual private networks (VPNs), IPsec, SSL/TLS, LDAP and public key infrastructure (PKI). • Familiarity with security solutions such as Twistlock and Aqua Security. In addition, tools such as Docker, Kubernetes, Azure security center and AWS CloudTrail. • Experienced in the use of threat modeling and application security architecture review. • Experience and understanding of various regulatory requirements and laws, including but not limited to: Payment Card Industry (PCI), Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR) and Gramm-Leach-Bliley Act (GLBA). Additionally, experience in one or more of the following: ISO 27001/2, ITIL or NIST is preferred. |
|