DescriptionThe Cyber Security Analyst specialising in Cloud Security will be responsible for safeguarding our cloud infrastructure, applications and services. They will work as part of the Cyber Security Solutions Team ensuring security is integrated into the design, deployment, and operations of cloud-based systems. This role will involve identifying and mitigating cloud-related security risks, ensuring compliance with industry standards, and driving continuous improvement in cloud security practices. They will help to ensure that the organisation's cloud environments are designed, managed, and configured according to the highest Cyber Security principles and that Cloud environments are configured to comply with industry good practice, standards and regulatory requirements. The individual will work closely with cloud specialists across the organisation to provide technical expertise, validate cloud security configurations, and support the overall Cyber Security posture.
Responsibilities- Cloud Security Strategy and Design: Help develop and implement cloud security frameworks, ensuring that security best practices are integrated into all aspects of cloud infrastructure and services.
- Cloud Security Operations: Ensure appropriate monitoring, detection, and response to security threats and vulnerabilities within cloud environments is embedded from the outset. Conduct risk assessments and security audits to identify areas of improvement and ensure compliance with regulatory requirements.
- Incident Response & Forensics: Support incident response efforts in cloud environments, including identifying and investigating security incidents and breaches. Provide technical input and support to root cause analysis and recommend corrective actions.
- Automation & Optimisation: Automate security controls, monitoring, and response processes to improve operational efficiency and reduce risk in cloud environments.
- Collaboration & Communication: Work closely with development teams, DevOps, and other stakeholders to implement security controls in cloud infrastructure. Provide clear and concise communication to both technical and non-technical stakeholders regarding security risks, incidents, and resolutions.
- Compliance & Governance: Ensure adherence to regulatory requirements and industry standards within cloud environments. Assist with audits and ensure security governance is in place.
- Continuous Improvement: Stay up-to-date with emerging cloud security trends and vulnerabilities. Continuously evaluate and enhance security practices to keep up with evolving cloud technologies and threats.
Qualifications- Strong experience of hands-on technical experience in Cloud security engineering, with a proven track record of securing cloud environments.
- Solid experience with cloud architecture, security protocols, and secure cloud configurations.
- Proven track record of providing Cyber Security guidance on cloud application design, implementation, and ongoing management.
- Experience in ensuring compliance with industry standards and regulations related to cloud security (e.g., NIST, ISO 27001, PCI-DSS, GDPR).
- Experience working with cross-functional teams and collaborating with development engineers, Cyber Security specialists, and other internal stakeholders to ensure cloud security.
- Deep knowledge of cloud platforms and services (Azure, Google Cloud).
- Experience of security Cloud platforms including Salesforce.
- Expertise in cloud security tools and technologies (e.g., Shield, Azure Security, SCCP, Wiz, Guard).
- Strong understanding of web application and cloud firewalls, encryption, identity and API security.
- Experience with automation tools (e.g., Terraform, Ansible, CloudFormation) for securing cloud infrastructure.
Â
Ideally, you’ll have:Â
- Experience with network security in cloud environments (e.g., AWS, Azure) and hybrid network configurations.
- Experience with DevSecOps practices, secure coding, and cloud-native application security.
- Familiarity with containerisation technologies (e.g., Docker, Kubernetes) and their security implications.