Senior Cloud Security Specialist
Listed on 2026-01-13
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Systems Engineer
Job Description
Req : RQ211912
Type of Requisition: Regular
Clearance Level Must Be Able to Obtain: None
Public Trust/Other
Required:
None
Job Family: Cyber and IT Risk Management
Skills:
Security Information,Security Monitoring,Security Requirements,Security System Design,System Security
Certifications:
Certified Information Systems Security Professional (CISSP) | International Information System Security Certification Consortium (ISC2) - International Information System Security Certification Consortium (ISC2), AWS Certified Solutions Architect - Professional | Amazon Web Services (AWS) - Amazon Web Services (AWS)
Experience:
7 + years of related experience
ResponsibilitiesProvide subject matter expertise for implementing secure by design concept into development to include security design principles, data protection, threat and vulnerability management, compliance and governance, threat and vulnerability management, and performance risk assessments.
Provide an advanced level of information security expertise needed to solve difficult challenges pertaining to the design and implementation of information security solutions, which may include, but is not limited, to networking, operating system, application and database security relative to both techniques and technologies.
Identify, document, and automate the integration of security controls into the enterprise architecture and system development life cycle process enabling ongoing (continuous) security monitoring, automated security authorization, and transparent risk reporting.
Gain organizational approval for the design and architecture of security requirements for cloud environment including the DWaaS component. Implement and maintain upon approval.
Design, implement and maintain layered system security architectures encompassing software, hardware, and communications to support the requirements and provide for present and future cross-functional needs and interfaces.
Provide subject matter expertise and hands‑on guidance to teams for embedding secure‑by‑design principles throughout the product lifecycle, including threat modeling and secure coding practices.
Design and implement cloud workloads, services, databases, etc. with security as a primary consideration, including network segmentation, granular access control, data protection, and encryption and zero trust principles.
Integrate automated security testing in the CI/CD pipelines enabling real‑time feedback and rapid remediation of vulnerabilities during development and deployment.
Collaborate with the AO Information System Security Office (ISSO) to schedule periodic penetration testing and conduct vulnerability assessments.
Provide monthly and ad‑hoc reports on identified vulnerabilities, remediation actions, and security breaches covering all access layers (database, application, infrastructure). Include trend analysis and recommendations for continuous improvement.
Maintain a risk register and track mitigation process.
Propose, implement, and validate security risk mitigation activities for all non‑production and production environments with documented evidence of effectiveness.
Validate successful implementation of risk mitigation activities for all non‑production and production environments.
Develop and maintain all Cloud Security Documentation:
System Security Plan, Business Continuity Analysis, Disaster Recovery Plan, other documents required for Authority to Operate (ATO).Create and maintain a Cloud Security Roadmap, provide updates quarterly and obtain organizational approval for all security architecture and design artifacts.
Implement and document technical and administrative controls to protect sensitive data from unauthorized internal access, including logging, monitoring, and access reviews.
Provide operational support for identity and access management (IAM) with granular role‑based access controls, integration with on‑premises identity management solutions in accordance with Judiciary enterprise security standards and cloud identity solutions and enable product teams to maintain a private image catalog for team specific isolation.
Support secure design and operation of multi‑segment…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).