Epicareer Might not Working Properly
Learn More

Cloud Security Engineer

  • Full Time, onsite
  • AgreeYa Solutions
  • Hybrid1 days/week onsite, United States of America
Salary undisclosed

Checking job availability...

Original
Simplified

Title- Cloud Security Engineer
Location- Austin, TX- 1 day onsite/week
Type- Contract

Job Description-
Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives. Analyzes user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyze current operational procedures, identify problems, and learn specific input and output requirements, such as forms of data input, how data is to be; summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program. Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system.

Minimum Requirements:
Coordinates and executes security policies and controls, as well as assess vulnerabilities within the company.
Experience with data and network security processing, security systems management, and security violation investigation.
On a daily basis performs analysis of on-prem and cloud security operations and works with DevSecOps teams with delivery of security related activities including audits, documentation, and reporting.
Understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software. Works with DevSecOps and custodians.
Experience with managing various projects and ability to plan and oversees all aspects of the projects.
Strong ability to identify problems/issues, analyze and evaluate alternatives and recommend/implement effective solutions.
8Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations.
Experience implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers methodologies, in order to anticipate breaches.
Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans.
Review violations of computer security procedures and discuss procedures with HHSC/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
Experience with Security web application firewalls.
Experience with managing conflict and resolving issues at managerial levels.
Experience with reviewing and coordinating audit responses, evidence gathering, and plan of actions. Experience collaborating with IT departments to coordinate audit responses.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job

Title- Cloud Security Engineer
Location- Austin, TX- 1 day onsite/week
Type- Contract

Job Description-
Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives. Analyzes user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyze current operational procedures, identify problems, and learn specific input and output requirements, such as forms of data input, how data is to be; summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program. Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system.

Minimum Requirements:
Coordinates and executes security policies and controls, as well as assess vulnerabilities within the company.
Experience with data and network security processing, security systems management, and security violation investigation.
On a daily basis performs analysis of on-prem and cloud security operations and works with DevSecOps teams with delivery of security related activities including audits, documentation, and reporting.
Understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software. Works with DevSecOps and custodians.
Experience with managing various projects and ability to plan and oversees all aspects of the projects.
Strong ability to identify problems/issues, analyze and evaluate alternatives and recommend/implement effective solutions.
8Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations.
Experience implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers methodologies, in order to anticipate breaches.
Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans.
Review violations of computer security procedures and discuss procedures with HHSC/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
Experience with Security web application firewalls.
Experience with managing conflict and resolving issues at managerial levels.
Experience with reviewing and coordinating audit responses, evidence gathering, and plan of actions. Experience collaborating with IT departments to coordinate audit responses.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job