Cloud Operations Security Engineer at 2nd Watch in Remoteother related Employment listings - Charleston, TN at Geebo

Cloud Operations Security Engineer at 2nd Watch in Remote

Cloud Operations Security Engineer The ideal candidate is someone who Operates with the highest levels of integrity Thinks Big and takes on Big Challenges Has a continuous thirst for knowledge and is a perpetual learner Strives to make themselves and everyone around them better Has a passion for technology Our Cloud Security Engineer ensures proper configuration standards are met and sustained in compliance with security policy, procedures, standards and industry requirements/best practices. You will have the opportunity to implement and maintain network security controls including CASB, next generation firewalls, container security and automated compliance tools. Additionally you'll get to perform cyber security monitoring of 2nd Watch's customer cloud environments ensuring proper monitoring coverage that correlates with internal security operations and processes. To be successful in this role, you should have a proven understanding of the CSA Cloud Controls Matrix as well as other security standards and regulations such as NIST, ISO, PCI. You will also want to have a deep understanding of cloud platforms such as AWS, Azure, and GCP.
Responsibilities:
Configure, implement, monitor, and support network security software/systems that will help ensure compliance with CSA Cloud Controls Matrix in cloud environments (AWS/Azure/GCP) Update security tools for logging/monitoring and growing coverage of existing tools Make recommendations to management on enhancements to existing and new security software or related tools Assist in evaluating, planning and implementation of new/existing security applications/tools that integrate with current tool sets Help implement and maintain next-generation enterprise protection tools and malware detection technologies Ensure security standard methodologies are identified and integrated into all facets of projects including network, system designs/configuration and implementations Identify and recommend potential areas where existing data security policies and procedures require change, or where a supplement is required to mitigate key security risks Partner with various business units to enhance security policies/procedures Create and maintain data security documentation, policies and procedures
Qualifications:
Experience with most or all of the following:
AWS, Azure, GCP, Change Control & Configuration Management, CASB, Cloud Encryption & Key Management, Cloud Compliance tools (CloudTrail, Forseti, Security Monkey) Automated Compliance (Red Lock, Evident IO, Domain 9), Identity & Access Management DDoS protection (Cloud Armor) Cloud Incident Response and Forensics, Container Vulnerability management Bachelor's degree or equivalent work experience Security certification such as CCSP, CISSP, GIAC, etc Five years of information technology experience, IT security experience preferred Strong networking and firewall configuration and deployment background Scripting skills desired eg:
python Demonstrated collaborative skills and ability to work well within a team Ability to work with and influence peers and senior management Self-motivated with critical attention to detail, deadlines and reporting Preferred experience working with 3rd party security tools such as:
Armor, Splunk, Alert Logic, Trend Micro, Prisma.
Salary Range:
$80K -- $100K
Minimum Qualification
IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.