Cloud Security Engineer at WorkWave – Remote, New Jersey
Explore Related Opportunities
About This Position
We are seeking a proactive, hands-on Cloud Security Engineer to serve as the primary security partner for our Engineering and DevOps teams. In this role, you will be the "North Star" for secure cloud configuration, moving beyond simple alert triaging to building sustainable security foundations. You will bridge the gap between high-level security architecture and daily engineering execution, ensuring our AWS and Azure environments are resilient, compliant, and automated.
Cloud Governance & Guardrails: Lead the deployment and optimization of AWS Control Tower, Security Hub, and AWS WAF to establish a secure multi-account strategy.
Cloud Security Platform Ownership: Own cloud security outcomes across AWS (primary), Azure (secondary), and limited GCP, including secure landing zone standards, guardrails-as-code, detection coverage, and remediation automation.
Secure-by-Default Engineering: Design and implement reusable, secure-by-default cloud patterns that allow engineering teams to deploy safely without constant security intervention. Establish hardened Terraform modules, reference architectures, and baseline configurations so the secure path becomes the easiest path for teams building in AWS.
Container Security: Collaborate with the AppSec Architect to secure EKS and ECS environments, focusing on runtime protection, image scanning, and least-privilege orchestration.
Security Assessment & Roadmap: Perform a comprehensive baseline assessment of the current cloud environment to identify gaps and provide actionable, prioritized recommendations.
Identity & Access Management: Lead design and enforcement of least-privilege IAM architecture across AWS accounts and workloads.
Operational Excellence: Develop and maintain secure configuration standards, documentation, and operational procedures that enable engineering teams to consistently deploy and operate cloud services securely.
Detection & Telemetry Ownership: Partner with security operations to ensure security telemetry from AWS environments is complete, centralized, and actionable (CloudTrail, GuardDuty, VPC Flow logs, etc.)
Cloud Security & Compliance Alignment: Ensure cloud configurations and controls align with internal security standards and external compliance requirements (ISO 27001, SOC 2, etc.). Partner with Security and GRC teams to implement audit-ready controls, automate evidence collection where possible, and maintain clear documentation of cloud security control coverage.
Third-Party Integration: Manage secure access and configuration for security vendor tools (vulnerability scanners, assessment platforms, etc.) within the cloud environment.
Incident Response: Participate in an on-call rotation for one week at a time and serve as primary SME for cloud security incidents (IAM compromise, exposed keys, misconfigurations, etc.).
Vulnerability & Exposure Management: Build and run the cloud vulnerability management program for AWS and Azure workloads, container images, and base AMIs. Define severity-based SLAs, implement scalable scanning and patch workflows (e.g., AWS Inspector, ECR scanning, hardened base images), and partner with Engineering to reduce exploitable exposure.
Cloud Security Tooling Ownership: Own onboarding, coverage validation, and tuning of CSPM and MDR integrations across AWS, Azure and GCP. Drive measurable improvement in signal quality, alert fidelity, and remediation workflows through automation and engineering partnerships.
Secrets, Keys, and Credential Hygiene: Design and enforce secure secrets management patterns (AWS Secrets Manager/Parameter Store/Vault), automated rotation, and least-privilege secret access. Own KMS key strategy and governance (key policies, grants, rotation, separation of duties) and ensure no long-lived credentials in CI/CD.
CI/CD and Supply Chain Security: Secure the software delivery pipeline end-to-end, including identity federation for CI/CD, policy-as-code enforcement for Terraform and Kubernetes, artifact integrity controls (signing/provenance), and secure dependency/source controls. Ensure security guardrails are automated and developer-friendly.
Cloud Incident Readiness & Exercises: Build cloud-native incident playbooks (IAM compromise, crypto-mining, data exposure, suspicious network activity) and run periodic tabletop exercises. Ensure forensics readiness through log retention standards, immutable/auditable logging where appropriate, snapshot/containment procedures, and break-glass access controls.
Multi-Cloud & Hybrid Baselines: Establish minimum viable security baselines for Azure and GCP (identity, logging, storage, network, key management) and ensure telemetry parity into centralized detection. Partner with operation teams to secure hybrid connectivity with data center environments (segmentation, identity boundaries, secure administrative access).
Security Metrics & Continuous Improvement: Define and report on key cloud security metrics (coverage, misconfiguration trends, MTTR, control adoption, vulnerability SLAs). Use metrics to prioritize work, demonstrate risk reduction, and drive engineering alignment.
Leadership and Execution: Mentor other engineers and raise baseline security literacy in platform/DevOps teams through patterns, reviews, and internal enablement.
5–8+ years of experience in Information Security, with at least 3+ years focused specifically on AWS Cloud Security.
AWS Deep Dive: Deep hands-on experience designing and securing AWS environments, core services (IAM, VPC, S3, KMS) and security-specific services (GuardDuty, Inspector, Config).
IaC Proficiency: Strong hands-on experience with Terraform for managing cloud infrastructure.
Containerization: Proven experience securing containerized workloads in EKS or ECS.
Azure Knowledge: Willingness to provide basic security support/maintenance for an existing Azure environment (Deep expertise not required; AWS is the priority).
Consultative Mindset: Ability to assess a complex environment and provide a "roadmap to green" rather than just identifying problems.
Collaborative Partnership: Ability to work side-by-side with engineers, speaking their language and helping them solve problems rather than just "blocking" tickets.
Strategic Documentation: Capability to translate technical configurations into clear, repeatable processes and procedures.
Automation First: A drive to automate manual security tasks to increase efficiency and reduce human error.
Education/Certifications: Bachelor’s degree in Computer Science, Information Security, or a related field or equivalent work experience.
Industry certifications such as Azure security certification, AWS Certified Security – Specialty or related are highly desirable.
$120,000 - $145,000 a year