BSc/MSc in Information Security or any other related field.
Minimum 2 year working experience in Information Security, with proven focus in Cloud Security.
AWS Certified Security - Specialty Certification.
Deep technical knowledge of Amazon Web Services (AWS).
Expertise in Microsoft Azure and Oracle Cloud will be considered an advantage.
Hands-on experience on AWS services such as IAM, Organizations, SSO, VPC, Transit Gateway, S3, EC2, RDS, ELB, CloudTrail, Config, Inspector, GuardDuty, WAF, etc.
Clear understanding of current threats to Cloud infrastructure and advanced knowledge of securing such environments.
Experience in DevSecOps methodologies is considered a plus.
Experience building and deploying applications to the cloud (AWS, Azure, etc.) using Infrastructure as Code tools such as Terraform is considered a plus.
Expertise in container security is considered a plus.
Ability to work autonomously with minimum supervision and to integrate well within a team.
Excellent problem solving and analytical skills.
Ability to quickly learn new technologies in depth.
Responsibilities:
Design and build resilient Cloud infrastructures that are protected against security threats.
Develop and assess Cloud security solutions to secure systems, databases, and networks.
Conduct assessments and make recommendations to ensure that appropriate controls are in place.
Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments.
Participate in efforts that shape the company’s security policies, procedures, and standards for use in Cloud environments.
Create technical and managerial level security reports for Cloud-based applications and infrastructure.
Implement and test network and security Disaster Recovery procedures to ensure business continuity.
Monitor use of sensitive data and regulate access to safeguard information.
Ensure the confidentiality and integrity of data during transmission, storage, and processing.
Review violations of security procedures and discuss procedures with violators to ensure they are not repeated.
Provide support to end users regarding network and security-related issues.