【Job Board】Senior Cloud Security Engineer

bluetata
云计算领域优质创作者
博客专家认证
2023-02-16 14:51:25

THE TEAM

The team is comprised of our Defensive and Offensive Engineering teams alongside our Information Security Officers, whilst our CISO leads the operation. Our security team interact with the product and platform engineering teams across the company to promote best practices and awareness. They’re continually baking security into our culture, utilising new technologies and open-source tools to ensure high standards of security are maintained.

THE ROLE

We are expanding the Security Engineering team extensively, meaning that there are many skill-sets and experiences required. Your place within the team will depend on your individual strengths and interests, to give you an idea of some of the areas that of expertise we are looking for, here are some of the key projects/ workloads our team take on:

  • Creating a Secure Software Development Lifecycle (SSDLC)
  • Securing our cloud-native (AWS, GCP and Azure) distributed system architecture
  • Creating security tools and implementing them to enhance our specific security landscape
  • Advocating the DevSecOps mindset that we have created across our engineering teams

THE TECH

  • Infrastructure: AWS, GCP, Azure, Kubernetes (this will increase as we go cloud-agnostic)
  • Platform: CockroachDB, EKS, GKE, PostgresDB, Vault, Consul, Linkerd, Cilium, NATS
  • Tools: Terraform, Github, Flux, Prometheus, Pact.io, TFSec, Travis CI
  • Code: Go, (a little Java), CQRS, Open-Source, Python (Security tools)
  • Ways of working: DevSecOps, GitOps, TDD/BDD, Pair Programming, 100% Remote

WHAT WE NEED FROM YOU AND WHY

  • Experience in securing SDLCs, conducting SAST and DAST testing, threat modelling, code analysis and incident management. Our engineering teams are constantly developing new products that are added to our singular API gateway so the CI/CD pipeline must be secure by design.
  • Ability to create, deliver and enhance security of cloud-native distributed systems (we use AWS and GCP at present with Terraform as our Iac tool), following the best practices and implementing security controls post assessment. We are also looking to become cloud-agnostic meaning there will be opportunity for you to showcase your abilities across other cloud platforms.
  • Strong programming skills, we are flexible on languages, we use Go as our main language for production so a willingness or interest to learn Go is fundamental. In security we write our own scripts for automation in Python, Go and other languages while contributing to open-source tools so we can utilise them.
  • Familiarity with containerisation and microservices architecture security concepts is also crucial to being successful in this role.
  • Willingness to be part of the on-call rota.

DESIRABLES AND YOUR SPECIALISMS

SDLC Based:

  • 3+ Years of expertise in Kubernetes, securing clusters and meshes (Cilium is preferable), networking best practices and RBAC implementation (CKA, CKS qualifications are a plus)
  • Experience in hardening Linux OSs
  • +3 Years of container security knowledge including container image provenance (Sigstore and Notary as examples) with an in-depth knowledge of container runtimes/ Docker and the security controls and best practice that surround microservice architectures
  • Involvement in DevSecOps operations within Agile environments on to CI/CD pipelines (Travis CI and Flux are our tools) with the ability to choose the right tool to fit purpose
  • Hands on work within agile DevOps environments that follow the DevSecOps best practices, where you expressed the ability to choose the right tool to fit purpose
  • CI/CD pipeline (Travis CI and Flux are our tools) security management

Wider Security:

  • Hands on experience taking your company through any of the following ISO27001, ISAE3000, SOC2/1, GDPR, PCI-DSS
  • Previous experience in developing security road maps and architectures alongside Security Architects in cloud-native or hybrid-infrastructures including network security (AWS solutions architect or GCP professional cloud architect are a plus)
  • Previous experience in network security, preferably in hybrid infrastructure based environments, you will have managed, switches, network segmentation, ports and firewalls across the entire OSI model.

Personal Interests:

  • Keen interest in new and emerging threats, vulnerabilities and adversary advancements coupled with the ability to present these to the wider team
  • Active contributor to open-source projects and passion for developing internal tools (our engineers were some of the main contributors for TFSec)
  • Additional Qualifications (nice to have but not necessary): OSCP, CASE, CCSP, AWS Security Specialist or GCP Professional Cloud Security Engineer
...全文
301 回复 打赏 收藏 转发到动态 举报
AI 作业
写回复
用AI写文章
回复
切换为时间正序
请发表友善的回复…
发表回复

182

社区成员

发帖
与我相关
我的任务
社区描述
面向想学习云原生的朋友提供交流园地,社区管理员沐风晓月联合云原生方向的大牛一起打造。 本社区将长期面向社区进行组织技术交流活动。欢迎各位朋友加入云原生社区,本社区诚邀各位推广投稿。
云原生微服务linux 个人社区 北京·海淀区
社区管理员
  • 我是沐风晓月
  • bluetata
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧