Job Description
OF SERVICES
Office of the Attorney General of Texasrequires the services of
1 Network Security Engineer 3 hereafter referred to as Candidate(s) who meets the general qualifications of
Network Security Engineer 3 Securityand the specifications outlined in this document for the
Office of the Attorney General of Texas.
All work products resulting from the project shall be considered works made for hire and are the property of the
Office of the Attorney General of Texas and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law.
Office of the Attorney General of Texaswill pay no fees for interviews or discussions which occur during the process of selecting a Candidate(s).
The Network Security Engineer is responsible for designing implementing and maintaining security controls that protect cloud infrastructure cloud-native applications and artificial intelligence (AI) and machine learning (ML) platforms. The role focuses on reducing risk ensuring compliance and enabling secure innovation in cloud and AI environments.
Key Responsibilities
- Design implement and manage security controls for cloud platforms including infrastructure-as-a-service (IaaS) platform-as-a-service (PaaS) and cloud-native workloads
- Secure AI and ML systems including model development environments training pipelines data pipelines APIs and inference services
- Assess and mitigate risks related to cloud misconfigurations identity and access management data exposure and insecure APIs
- Implement and maintain cloud security tooling such as CSPM CWPP CIEM container security and API security solutions
- Collaborate with engineering DevOps data science and AI teams to embed security into CI/CD pipelines and ML workflows (DevSecOps / MLOps)
- Conduct security architecture reviews threat modeling and risk assessments for cloud and AI initiatives
- Define and enforce security standards guardrails and best practices for cloud and AI environments
- Monitor cloud and AI environments for security events investigate alerts and support incident response activities
- Using TTP Add/Modify Splunk alerts to triage notables
- Ensure protection of sensitive data used in AI systems through encryption key management data loss prevention and privacy controls
- Support compliance with regulatory contractual and internal security requirements (e.g. SOC 2 ISO 27001 NIST GDPR)
- Stay current on emerging cloud and AI threats vulnerabilities and industry best practices
The above job description and requirements are general in nature and may be subject to change based on the specific needs and requirements of the organization and project.
SKILLS AND QUALIFICATIONS
Minimum Requirements: Candidates that do not meet or exceed theminimumstated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. |
| Years | Required/Preferred | Experience |
| 8 | Required | Proven work in security architecture demonstrating solutions delivery principles and emerging technologies designing and implementing security solutions. Continuous monitoring and making improvements to those solutions. |
| 8 | Required | Designing and implementing the security measures needed to protect data stored on public clouds against unauthorized access including secure authentication methods encryption access control lists intrusion detection systems firewalls other measures |
| 8 | Required | Understanding of multi-cloud security architectures covering infrastructure information security tools cloud-based application security and other cloud-based technology and infrastructure architectures. |
| 8 | Required | Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization to meet business goals along with customer and regulatory requirements. |
| 8 | Required | Proven expertise in security considerations of cloud computing: They include data breaches broken authentication hacking account hijacking malicious insiders third parties APTs data loss and DoS attacks. |
| 8 | Required | Knowledge and understanding of threat analysis and assessment of potential and current information security risk/threats and designing solutions to mitigate those threats. |
| 8 | Required | Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards. |
| 8 | Required | Knowledge and experience working with ISO27001 specifications for a framework of policies and procedures that include all legal physical and technical controls involved in an organizations risk management. |
| 8 | Required | Experience with SPLUNK creating alerts executive reports dashboards. |
| 8 | Required | Designing and developing security architectures that align with an organizations strategic goals. Creation of architectural artifacts for key technology initiatives. |
| 8 | Required | Ability to resolve complex security issues in diverse and decentralized environments; to learn communicate and teach new information and security technologies; and to communicate effectively. |
| 8 | Required | Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future. |
| 8 | Required | Creating/reviewing/updating security policies and standards for the public/private/hybrid cloud contexts. |
| 3 | Preferred | GSEC CEH CISA CCSP desired. |
| 3 | Preferred | Certification as an AWS Solutions Architect Cloud Security Certification and/or OpenStack Administrator Certification a plus. (Other cloud-related certification also a plus.) |
| 3 | Preferred | Experience with Endpoint Detection and Response (i.e. EndGame Crowdstrike CyberReason). Detect and respond to alerts from end point detection response tools. |
| 3 | Preferred | Experience with Email Threat Management (i.e. Proofpoint MimeCast Microsoft). |
| 3 | Preferred | Experience with SIEM engineering design/management/analysts (i.e. Splunk Rapid7 SumoLogic). |
| 3 | Preferred | Experience with Data Loss Protection/Cloud Access Security Brokers (i.e. Symantec Microsoft Bitglass Netskope). |
| 3 | Preferred | Experience with Cloud Enterprise Network Security (i.e. Cisco Umbrella Palo Alto ZScaler). |
OF SERVICE
Services are expected to start03/16/2026and are expected to complete by08/31/2026. Total estimated hours per Candidate shall not exceed1016hours. This service may be amended renewed and/or extended providing both parties agree to do so in writing.
IV. WORK HOURS AND LOCATION
Services shall be provided during normal business hours unless otherwise coordinated through theOffice of the Attorney General of Texas. Normal business hours are Monday through Friday from8:00 AM to 5:00 PM excluding State holidays when the agency is closed.
The primary work location(s) will be atOAG State Office located at 5500 E. Oltorf St Austin TX 78741. Teleworking is currently allowed for this contract position with management approval.. The working position isTelework. Any and all travel per diem parking and/or living expenses shall be at the Candidates and/or Vendors expense.Office of the Attorney General of Texaswill provide pre-approved written authorization for travel for any services to be performed away from the primary work location(s). Pre-approved travel expenses are limited to the rates and comply with the rules prescribed by the State of Texas for travel by its classified employees including any requirement for original receipts.
The Candidate(s) may be required to work outside the normal business hours on weekends evenings and holidays as requested. Payment for work over 40 hours will be at the hourly rate quoted and must be coordinated and pre-approved throughOffice of the Attorney General of Texas.
SPECIAL REQUIREMENTS
The candidate(s) will be subject to a criminal background check that includes a DPS/FBI background check and fingerprinting
Required Experience:
IC
Job Description OF SERVICESOffice of the Attorney General of Texasrequires the services of1 Network Security Engineer 3 hereafter referred to as Candidate(s) who meets the general qualifications ofNetwork Security Engineer 3 Securityand the specifications outlined in this document for theOffice of t...
Job Description
OF SERVICES
Office of the Attorney General of Texasrequires the services of
1 Network Security Engineer 3 hereafter referred to as Candidate(s) who meets the general qualifications of
Network Security Engineer 3 Securityand the specifications outlined in this document for the
Office of the Attorney General of Texas.
All work products resulting from the project shall be considered works made for hire and are the property of the
Office of the Attorney General of Texas and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law.
Office of the Attorney General of Texaswill pay no fees for interviews or discussions which occur during the process of selecting a Candidate(s).
The Network Security Engineer is responsible for designing implementing and maintaining security controls that protect cloud infrastructure cloud-native applications and artificial intelligence (AI) and machine learning (ML) platforms. The role focuses on reducing risk ensuring compliance and enabling secure innovation in cloud and AI environments.
Key Responsibilities
- Design implement and manage security controls for cloud platforms including infrastructure-as-a-service (IaaS) platform-as-a-service (PaaS) and cloud-native workloads
- Secure AI and ML systems including model development environments training pipelines data pipelines APIs and inference services
- Assess and mitigate risks related to cloud misconfigurations identity and access management data exposure and insecure APIs
- Implement and maintain cloud security tooling such as CSPM CWPP CIEM container security and API security solutions
- Collaborate with engineering DevOps data science and AI teams to embed security into CI/CD pipelines and ML workflows (DevSecOps / MLOps)
- Conduct security architecture reviews threat modeling and risk assessments for cloud and AI initiatives
- Define and enforce security standards guardrails and best practices for cloud and AI environments
- Monitor cloud and AI environments for security events investigate alerts and support incident response activities
- Using TTP Add/Modify Splunk alerts to triage notables
- Ensure protection of sensitive data used in AI systems through encryption key management data loss prevention and privacy controls
- Support compliance with regulatory contractual and internal security requirements (e.g. SOC 2 ISO 27001 NIST GDPR)
- Stay current on emerging cloud and AI threats vulnerabilities and industry best practices
The above job description and requirements are general in nature and may be subject to change based on the specific needs and requirements of the organization and project.
SKILLS AND QUALIFICATIONS
Minimum Requirements: Candidates that do not meet or exceed theminimumstated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. |
| Years | Required/Preferred | Experience |
| 8 | Required | Proven work in security architecture demonstrating solutions delivery principles and emerging technologies designing and implementing security solutions. Continuous monitoring and making improvements to those solutions. |
| 8 | Required | Designing and implementing the security measures needed to protect data stored on public clouds against unauthorized access including secure authentication methods encryption access control lists intrusion detection systems firewalls other measures |
| 8 | Required | Understanding of multi-cloud security architectures covering infrastructure information security tools cloud-based application security and other cloud-based technology and infrastructure architectures. |
| 8 | Required | Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization to meet business goals along with customer and regulatory requirements. |
| 8 | Required | Proven expertise in security considerations of cloud computing: They include data breaches broken authentication hacking account hijacking malicious insiders third parties APTs data loss and DoS attacks. |
| 8 | Required | Knowledge and understanding of threat analysis and assessment of potential and current information security risk/threats and designing solutions to mitigate those threats. |
| 8 | Required | Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards. |
| 8 | Required | Knowledge and experience working with ISO27001 specifications for a framework of policies and procedures that include all legal physical and technical controls involved in an organizations risk management. |
| 8 | Required | Experience with SPLUNK creating alerts executive reports dashboards. |
| 8 | Required | Designing and developing security architectures that align with an organizations strategic goals. Creation of architectural artifacts for key technology initiatives. |
| 8 | Required | Ability to resolve complex security issues in diverse and decentralized environments; to learn communicate and teach new information and security technologies; and to communicate effectively. |
| 8 | Required | Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future. |
| 8 | Required | Creating/reviewing/updating security policies and standards for the public/private/hybrid cloud contexts. |
| 3 | Preferred | GSEC CEH CISA CCSP desired. |
| 3 | Preferred | Certification as an AWS Solutions Architect Cloud Security Certification and/or OpenStack Administrator Certification a plus. (Other cloud-related certification also a plus.) |
| 3 | Preferred | Experience with Endpoint Detection and Response (i.e. EndGame Crowdstrike CyberReason). Detect and respond to alerts from end point detection response tools. |
| 3 | Preferred | Experience with Email Threat Management (i.e. Proofpoint MimeCast Microsoft). |
| 3 | Preferred | Experience with SIEM engineering design/management/analysts (i.e. Splunk Rapid7 SumoLogic). |
| 3 | Preferred | Experience with Data Loss Protection/Cloud Access Security Brokers (i.e. Symantec Microsoft Bitglass Netskope). |
| 3 | Preferred | Experience with Cloud Enterprise Network Security (i.e. Cisco Umbrella Palo Alto ZScaler). |
OF SERVICE
Services are expected to start03/16/2026and are expected to complete by08/31/2026. Total estimated hours per Candidate shall not exceed1016hours. This service may be amended renewed and/or extended providing both parties agree to do so in writing.
IV. WORK HOURS AND LOCATION
Services shall be provided during normal business hours unless otherwise coordinated through theOffice of the Attorney General of Texas. Normal business hours are Monday through Friday from8:00 AM to 5:00 PM excluding State holidays when the agency is closed.
The primary work location(s) will be atOAG State Office located at 5500 E. Oltorf St Austin TX 78741. Teleworking is currently allowed for this contract position with management approval.. The working position isTelework. Any and all travel per diem parking and/or living expenses shall be at the Candidates and/or Vendors expense.Office of the Attorney General of Texaswill provide pre-approved written authorization for travel for any services to be performed away from the primary work location(s). Pre-approved travel expenses are limited to the rates and comply with the rules prescribed by the State of Texas for travel by its classified employees including any requirement for original receipts.
The Candidate(s) may be required to work outside the normal business hours on weekends evenings and holidays as requested. Payment for work over 40 hours will be at the hourly rate quoted and must be coordinated and pre-approved throughOffice of the Attorney General of Texas.
SPECIAL REQUIREMENTS
The candidate(s) will be subject to a criminal background check that includes a DPS/FBI background check and fingerprinting
Required Experience:
IC
View more
View less