Tech Stack
AWSAzureCloudCyber SecurityGoogle Cloud PlatformKubernetesPython
About the role
- Lead engagements and perform technical analysis looking for high-risk configurations, attack paths, and architectural flows that may expose cloud resources to cyber threats
- Produce high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders including technical managers, security leaders, and legal
- Contribute to tool development and methodologies to continuously improve and evolve service offerings
Requirements
- In-depth understanding of one or more cloud platforms (AWS, Azure, and GCP) with emphasis on identity, security, networking, compute, serverless, and storage services
- Knowledge of cloud architecture and design principles, including security and resiliency considerations
- Understanding of logging, monitoring, and alerting to detect unauthorised access to cloud resources
- Ability to create search queries and dashboards in analytics platforms and write automation scripts in Python or another scripting language
- Knowledge of API authentication and authorisation, including identity protocols such as OAuth, SAML, and OpenID Connect
- Familiarity with DevSecOps, CI/CD pipelines, containers, and related security defenses and pitfalls
- Hands-on experience reviewing cloud security configurations, including configuration chaining and attack path mapping
- Strong ability to communicate analysis findings to clients, including technical and executive audiences, and legal counsel
- Capable of completing technical tasks without supervision
- Desire to grow and expand both technical and soft skills
- Strong project management skills
- Contributing thought leader within the cloud security/incident response industry
- Ability to foster a positive work environment and attitude
- Bonus: Cloud Incident Response knowledge in AWS, Azure, M365, or GCP incident response methodologies
- Bonus: Incident remediation experience creating customised tactical and strategic remediation plans for compromised organisations
- Bonus: Understanding of Kubernetes control plane and DevSecOps practices
- Education: BA or BS / MA or MS in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or related field (applicants without a degree but with relevant work experience and/or training will be considered)
- Certifications: CISSP, CISA, CISM, CCSP, or practitioner/security certifications in AWS, Azure, GCP or other cloud/SaaS platforms may be considered