The Cloud Security Engineer is responsible for safeguarding cloud data applications and infrastructure through your expertise in cybersecurity operations cloud security and DevSecOps for TRS. The incumbent will leverage tools like SIEM SAST DAST/IAST and orchestration platforms to automate policy enforcement on offpremises applications and infrastructure; respond rapidly to incidents through skilled analysis of anomalies across networks code and cloud infrastructure; create and deliver secure service deployment training to share across IT and application owners; ensure compliance while fostering collaboration between application owners IT operations and security teams. This position will proactively work with the Information Security team IT staff and agency employees.
WHAT WILL YOU DO:
Cybersecurity Operations
Monitor security alerts logs and events from various tools like SIEM firewalls endpoints etc. to detect any anomalies or potential incidents.
Collect process preserve and analyze digitalrelated evidence to support network vulnerability mitigation and workplace investigations.
Investigate and analyze suspicious or unusual activity to determine if it poses a true security risk. This may involve looking at additional logs files network traffic etc.
Validate and verify the root cause of any incidents and breaches that are identified. Support response and remediation efforts.
Respond to crises or urgent situations to mitigate immediate and potential threats. Use mitigation preparedness and response and recovery approaches. Investigate and analyze all relevant response activities.
Conduct application security reviews/testing (SAST DAST IAST etc. to identify vulnerabilities in code.
Work with application owners and IT to remediate vulnerabilities and implement secure cloud orchestration best practices.
Perform security architecture reviews of software/api designs.
Coordinate with Governance Risk and Compliance (GRC) team on conducting risk analyses (e.g. threat vulnerability and probability of occurrence) whenever an application or system undergoes a major change and provide recommendations for mitigation strategies/solutions.
Read interpret and execute simple scripts on Windows and UNIX systems (e.g. those that perform tasks such as: parsing large data files automating manual tasks and fetching/processing remote data).
Provide an accurate technical evaluation of the software application system or network documenting the security posture capabilities and vulnerabilities against relevant cybersecurity compliances.
Mitigate/correct security deficiencies identified during security testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative.
Assesses and monitors cybersecurity events related to system implementation and testing practices.
Provide afterhours support for information security functions.
Strategic Support
Analyze collected information to identify vulnerabilities and potential exploitation.
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
Build and maintain metrics for tracking improvements and deficiencies in the security of processes systems and programs
Performs related work as assigned.
WHAT WILL YOU BRING:
Required Education
Bachelors degree from an accredited college or university in Cybersecurity Information Security or a closely related field.
High school diploma or equivalent and additional fulltime experience in cybersecurity information security systems analysis programming computer operations IT business analysis or similarly related experience may be substituted on an equivalent yearforyear basis.
Required Experience
Three 3 years of fulltime directly related progressively responsible experience in cybersecurity information security systems analysis programming computer operations IT business analysis or similarly related experience.
One 1 year of fulltime directly related progressively responsible experience developing and training employees on security/privacy policies data handling practices and procedures and legal obligations or similarly related experience.
One 1 year of experience conducting IT audits and needs analysis to improve business process solution s. As well as developing and writing IT policies procedures and audit responses or similarly related experience.
Experience may be concurrent.
A masters degree or doctoral degree in a directly related field may be substituted on an equivalent yearforyear basis.
Required Registration Certification or Licensure
Certification as a Certified Information Systems Security Professional (CISSP) or other security related certifications.
Knowledge Skills and Abilities
Knowledge of:
Computer systems and technology limitations capabilities and secure implementations.
Information security systems controls methodologies practices and regulations including data encryption and information protection.
National and international laws regulations policies along with ethics as they relate to cybersecurity/privacy.
Risk management approaches in regard to information security and privacy.
Applicable state and federal laws statutes Presidential Directives executive branch guidelines related to information security or cybersecurity.
Current and emerging cyber technologies and cyber threats.
Defensive protocols and countermeasures incident response vulnerability management and event analysis.
Knowledge of common cybersecurity frameworks and compliance standards
Familiarity with security tools technologies and best practices
Security hardware and software options including the network artifacts they induce and their effects on exploitation.
Secure System Development Lifecycles Pipelining and Cloud Application Deployment
Agile methodology
Common infrastructure provisioning and automation tools
Skills in:
Analyzing complex technical problems and developing workable solutions.
Identify and analyze cybersecurity threats and risks
Troubleshooting debugging and problem solving skills
Creating technical documents and procedures as it relates to cybersecurity.
Managing multiple conflicting tasks/deadlines.
Attention to detail and log analysis skills
Scripting/code reading abilities in languages like PowerShell and Terraform
Effective verbal and written communication of complex technical information.
Ability to:
Learn new security tools and technologies quickly
Effectively research and critical thinking abilities
Adapt to changing requirements and incident response
Show passion for security and continuous selfimprovement
Communicate skills to translate technical concepts for nontechnical audiences
Effectively assess areas of risk associated with information security.
Monitor for attacks and run appropriate defensive protocols during incidents.
Perform employee training against phishing and other forms of cyberattack.
Determine the validity of technology trend data.
Assist with the development of policy plans and strategies in compliance with laws regulations policies and standards in support of organizational information security assurance.
Establish and maintain harmonious working relationships with coworkers agency staff and external contacts.
Work effectively in a professional team environment and independently.
Military Occupational Specialty (MOS) Codes:
Veterans Reservists or Guardsmen with experience in the Military Occupational Specialty along with the minimum qualifications listed above may meet the minimum requirements and are highly encouraged to apply. Please contact Talent Acquisition at with questions or for additional information.
To view all job vacancies visit or more information visit.