- Define Cloud Security Patterns: Create and document reusable security patterns and guardrails for AWS migration ensuring teams have a secure blueprint to build against.
- Architecture Design & Validation: Conduct deep-dive design reviews and service validations for applications moving to the cloud. You will be the final gate of approval for security architecture.
- Migration Strategy Assessment: Evaluate various migration strategies (Rehost Replatform Refactor) to identify risks and implement compensating controls specific to data security.
- Threat Modeling: Lead threat modeling sessions with engineering teams to identify vulnerabilities in the design phase (shifting security left).
- Business & Stakeholder Alignment: Translate complex security risks into business language. You will meet with application owners and business sponsors to discuss priorities user experience and risk appetite.
- Data Security Governance: Establish strict requirements and guidelines for data protection encryption and classification within the AWS environment.
Must-Have Technical Skills
- Experience: 7 -8 years in Cybersecurity with a dedicated focus on Security Architecture or Cloud Engineering.
- AWS Mastery: Deep hands-on understanding of the AWS ecosystem (IAM VPC Security Groups GuardDuty KMS etc.) and how to secure it.
- Migration Experience: Proven track record of supporting cloud migration projects (on-prem to cloud or hybrid).
- Architectural Competence: Experience conducting design reviews architectural assessments and validating service configurations.
- Communication: Exceptional soft skills. You must be able to hold your own in a room with non-technical business leaders and explain why a security control matters to their bottom line.
Qualifications :
These duties are too complex and specialized to be performable with a bachelors degree related to computer science or computer information systems or information technology.
Additional Information :
All your information will be kept confidential according to EEO guidelines.
Remote Work :
No
Employment Type :
Contract
Define Cloud Security Patterns: Create and document reusable security patterns and guardrails for AWS migration ensuring teams have a secure blueprint to build against.Architecture Design & Validation: Conduct deep-dive design reviews and service validations for applications moving to the cloud. You...
- Define Cloud Security Patterns: Create and document reusable security patterns and guardrails for AWS migration ensuring teams have a secure blueprint to build against.
- Architecture Design & Validation: Conduct deep-dive design reviews and service validations for applications moving to the cloud. You will be the final gate of approval for security architecture.
- Migration Strategy Assessment: Evaluate various migration strategies (Rehost Replatform Refactor) to identify risks and implement compensating controls specific to data security.
- Threat Modeling: Lead threat modeling sessions with engineering teams to identify vulnerabilities in the design phase (shifting security left).
- Business & Stakeholder Alignment: Translate complex security risks into business language. You will meet with application owners and business sponsors to discuss priorities user experience and risk appetite.
- Data Security Governance: Establish strict requirements and guidelines for data protection encryption and classification within the AWS environment.
Must-Have Technical Skills
- Experience: 7 -8 years in Cybersecurity with a dedicated focus on Security Architecture or Cloud Engineering.
- AWS Mastery: Deep hands-on understanding of the AWS ecosystem (IAM VPC Security Groups GuardDuty KMS etc.) and how to secure it.
- Migration Experience: Proven track record of supporting cloud migration projects (on-prem to cloud or hybrid).
- Architectural Competence: Experience conducting design reviews architectural assessments and validating service configurations.
- Communication: Exceptional soft skills. You must be able to hold your own in a room with non-technical business leaders and explain why a security control matters to their bottom line.
Qualifications :
These duties are too complex and specialized to be performable with a bachelors degree related to computer science or computer information systems or information technology.
Additional Information :
All your information will be kept confidential according to EEO guidelines.
Remote Work :
No
Employment Type :
Contract
View more
View less