You will secure the build, configuration, deployment, operation, and monitoring of VPCs inside leading commercial clouds as well as secure k8s platforms like D2IQ, Tanzu, Rancher, etc. You also provide expertise for secure management of the stack: monitoring, incident response, disaster recovery, security compliance/auditing, networking, storage, and service brokers. You will:
Secure all the things while hacking the bureaucracy
Continuously improve your product/service to enable high-speed security
Work with teams to automate security toil that can be automated
Work in an environment that supports your individual growth
We practice and teach an approach to cybersecurity engineering that applies across industries and organizations, so you’ll experience all types of teams, products, and technologies. And we believe in working at a sustainable pace – you’ll typically cyber hard for 8 hours each day, but then you’re off work to relax, recharge and refocus.
10+ years of a combination of development, security and operations experience
Applying both native cloud security and monitoring services in a major cloud provider, including VPC Service Controls, Firewall, Cloud KMS, Cloud Armor, Cloud IAM, Cloud Audit Logs, Cloud Security Command Center, and Cloud Security Scanner
Applying cybersecurity concepts, including threats, vulnerabilities, security operations, encryption, boundary defense, auditing, authentication, and risk management
Automating the provisioning and configuration of IT environments, including tools such as Terraform, Cloud Deployment Manager, Puppet, Chef, Ansible, or PowerShell tools
Applying network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS), anti-malware, vulnerability scanning, encryption, monitoring, and Identity, Credential, and Access Management (ICAM)
Developing technical engineering artifacts, including traceability matrices, network diagrams, data flow diagrams, installation procedures, and operations manuals
Cloud-native security best-practices, such as the AWS Security Pillar of the AWS Well-Architected Framework
Identity and access management best-practices such as least-privileged access control, cloud access policies, cross-account roles etc.
Expert knowledge administering Active Directory (AD) and GPO’s
Knowledge of server virtualization technologies
Securing large scale cloud and containerized production systems and dealing with security incidents in them
Training, mentoring and/or upskilling engineers
Managing a team of security engineers
Strong communication skills and interest in a client pairing environment
Applying lean and agile methodologies
BA/BS in Cybersecurity, Computer Science or related field, or equivalent experience
Strong policy understanding of RMF, FEDRAMP, DISA CC SRG, DISA CAP connection, DISA secure routing & endpoints for various DISA Impact Levels (ILs), and determining what services are authorized at various ILs
Strong understanding of the controls inheritance model and controls automation, shared responsibility model, and an understanding of modern RMF methodologies such as Continuous RMF via Ongoing Authorization
Azure and VMware Tanzu experience
Led implementation of a DoD program’s VPC to IL4/IL5 with CAP connection and full ATO from the ground up
Implementing NIST controls inheritance and controls automation and cRMF
Non-vendor certifications (one or more): Security+, CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, ISSEP, ISSMP, GCIH, GCFA, CSLC, CISM, CCNA, or CCNP
Vendor security certifications: Azure Security Engineer, etc.
Securing Kubernetes and the major cloud providers (CIS Benchmark for Kubernetes and the emerging DoD/DISA Kubernetes STIG,
Working with one or more of the following: vSphere, ESXi, NSX-V, NSX-T
Working directly with clients, especially DoD and/or "Software Factory"
Please Note: All of the work in this area is with Federal Government customers that require our employees involved with their projects be U.S. citizens. As such, this role requires U.S. citizenship. If hired, you would also be required to go through a background investigation for Public Trust Clearance. Ability to obtain a Secret or Top Secret Clearance preferred.
This employer is an Equal Employment Opportunity employer that will consider you for this role regardless of race, color, religion, gender, sexual orientation, marital status, gender identity or expression, national origin, genetics, age, disability status, protected veteran status, or any other characteristic protected by applicable law.