Refer a freelancer, and you both get 1 free week of DFH Premium. They must use your code {code} at sign-up. More referrals = more free weeks! T&Cs apply.
1 of 5 free roles viewed today. Upgrade to premium for unlimited.

Cloud Engineer

This role is for a Cloud Engineer in Austin, TX, on a contract basis. Key skills include AWS Cloud Security, DevSecOps, and security governance. Experience with NIST standards, security risk assessments, and managing security operations is required. Pay rate is "unknown."
🌎 - Country
United States
💱 - Currency
$ USD
💰 - Day rate
Unknown
Unknown
🗓️ - Date discovered
February 22, 2025
🕒 - Project duration
Unknown
🏝️ - Location type
Hybrid
📄 - Contract type
Unknown
🔒 - Security clearance
Unknown
📍 - Location detailed
Austin, TX
🧠 - Skills detailed
#Security #Splunk #Documentation #Cybersecurity #WAF (Web Application Firewall) #DevSecOps #Linux #Network Security #Programming #Data Access #Firewalls #AWS (Amazon Web Services) #Cloud #Dynatrace
Role description
You've reached your limit of 5 free role views today. Upgrade to premium for unlimited access.

Job Description: (Hybrid Position)

Position: Cloud Engineer

Location: Austin, TX

Duration: Contract

Requirements:
• Coordinates and executes security policies and controls, as well as assesses vulnerabilities within the company.
• Experience with data and network security processing, security systems management, and security violation investigation.
• Daily performs analysis of on-prem and cloud security operations and works with DevSecOps teams to deliver security-related activities including audits, documentation, and reporting.
• Understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software.
• Works with DevSecOps and custodians.
• Experience with managing various projects and ability to plan and oversee all aspects of the projects.
• Strong ability to identify problems/issues, analyze and evaluate alternatives, and recommend/implement effective solutions.
• Orchestrate calls to include, but are not limited to project kick-off calls, notification of high/critical findings during the testing process, and close-out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations.
• Experience implementing security measures to protect computer systems, networks, and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers’ methodologies, to anticipate breaches.
• Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans.
• Review violations of computer security procedures and discuss procedures with the client Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
• Experience with Security web application firewalls.
• Experience with managing conflict and resolving issues at managerial levels.
• Experience with reviewing and coordinating audit responses, evidence gathering, and plan of action. Experience collaborating with IT departments to coordinate audit responses.
• Skilled information technology professional with advanced experience developing and implementing IT policy, standards, and procedures.
• Experience in delivering technical training in cloud-based technology is a plus.
• Experience providing Windows and Linux operating systems and application support.
• Experience with information security risk assessments.
• Experience with security governance and documentation and security plan documents.
• In-depth knowledge of AWS Cloud Security is preferred.
• In-depth knowledge and hands-on experience on AWS Cloud Security preferred or experience with other Cloud service providers.
• Experience ITIL - ticketing using Remedy and ServiceNow.
• Ability to train staff on network and information security procedures, processes, and information safeguarding.
• Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys, and MS Office tools.