Cloud Security Engineer
Apply NowCompany: Teacher Retirement System of Texas
Location: Austin, TX 78745
Description:
JOB AD:
Location:
1900 Aldrich Street
Austin, Texas, 78723
United States
Cloud Security Engineer
Requisition ID:
req1202
Employment Type:
Unclassified Regular Full-Time (URF)
Division:
Information Security Office
Compensation:
108,036.00 - 135,044.00, Annual Salary
Location:
Alpha
Job Closing:
April 11th at 5:00 pm, CST
WHO WE ARE:
Service, Respect, and Connection are core to the individual and collective TRS experience. We know that great service rests on a foundation of relationships that connect us all to an empowering and rewarding career. At TRS, we're inspired by our community who bring authenticity and commitment to our mission to improve the retirement security of public education employees and retirees throughout Texas.
As a group of achievers, we tap collaboration and innovation to raise the bar in performance, administering and counseling pensions and healthcare benefits to ensure certainty for the future of our members. We invite you to join us, where both personal and career growth are respected and where you can make a difference in our members' lives every day.
The Cloud Security Engineer is responsible for safeguarding cloud data, applications, and infrastructure through your expertise in cybersecurity operations, cloud security, and DevSecOps for TRS. The incumbent will leverage tools like SIEM, SAST, DAST/IAST and orchestration platforms to automate policy enforcement on off-premises applications and infrastructure; respond rapidly to incidents through skilled analysis of anomalies across networks, code, and cloud infrastructure; create and deliver secure service deployment training to share across IT and application owners; ensure compliance while fostering collaboration between application owners, IT operations, and security teams. This position will proactively work with the Information Security team, IT staff, and agency employees.
WHAT WILL YOU DO:
Cybersecurity Operations
Monitor security alerts, logs, and events from various tools like SIEM, firewalls, endpoints, etc. to detect any anomalies or potential incidents.
Collect, process, preserve, and analyze digital-related evidence to support network vulnerability mitigation and workplace investigations.
Investigate and analyze suspicious or unusual activity to determine if it poses a true security risk. This may involve looking at additional logs, files, network traffic, etc.
Validate and verify the root cause of any incidents and breaches that are identified. Support response and remediation efforts.
Respond to crises or urgent situations to mitigate immediate and potential threats. Use mitigation, preparedness, and response and recovery approaches. Investigate and analyze all relevant response activities.
Conduct application security reviews/testing (SAST, DAST, IAST, etc.) to identify vulnerabilities in code.
Work with application owners and IT to remediate vulnerabilities and implement secure cloud orchestration best practices.
Perform security architecture reviews of software/api designs.
Coordinate with Governance, Risk, and Compliance (GRC) team on conducting risk analyses (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change and provide recommendations for mitigation strategies/solutions.
Read, interpret, and execute simple scripts on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).
Provide an accurate technical evaluation of the software application, system, or network, documenting the security posture, capabilities, and vulnerabilities against relevant cybersecurity compliances.
Mitigate/correct security deficiencies identified during security testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative.
Assesses and monitors cybersecurity events related to system implementation and testing practices.
Provide after-hours support for information security functions.
Strategic Support
Analyze collected information to identify vulnerabilities and potential exploitation.
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
Build and maintain metrics for tracking improvements and deficiencies in the security of processes, systems, and programs
Performs related work as assigned.
WHAT WILL YOU BRING:
Required Education
Bachelor's degree from an accredited college or university in Cybersecurity, Information Security or a closely related field.
High school diploma or equivalent and additional full-time experience in cybersecurity, information security, systems analysis, programming, computer operations, IT business analysis or similarly related experience may be substituted on an equivalent year-for-year basis.
Required Experience
Three (3) years of full-time directly related, progressively responsible experience in cybersecurity, information security, systems analysis, programming, computer operations, IT business analysis or similarly related experience.
One (1) year of full-time directly related, progressively responsible experience developing and training employees on security/privacy policies, data handling practices and procedures, and legal obligations or similarly related experience.
One (1) year of experience conducting IT audits and needs analysis to improve business process solution s. As well as developing and writing IT policies, procedures, and audit responses or similarly related experience.
Experience may be concurrent.
A master's degree or doctoral degree in a directly related field may be substituted on an equivalent year-for-year basis.
Required Registration, Certification, or Licensure
Certification as a Certified Information Systems Security Professional (CISSP) or other security related certifications.
Knowledge, Skills, and Abilities
Knowledge of:
Computer systems and technology limitations, capabilities, and secure implementations.
Information security systems, controls, methodologies, practices, and regulations, including data encryption and information protection.
National and international laws, regulations, policies, along with ethics as they relate to cybersecurity/privacy.
Risk management approaches in regard to information security and privacy.
Applicable state and federal laws, statutes, Presidential Directives, executive branch guidelines related to information security or cybersecurity.
Current and emerging cyber technologies and cyber threats.
Defensive protocols and countermeasures, incident response, vulnerability management, and event analysis.
Knowledge of common cybersecurity frameworks and compliance standards
Familiarity with security tools, technologies, and best practices
Security hardware and software options, including the network artifacts they induce and their effects on exploitation.
Secure System Development Lifecycles, Pipelining, and Cloud Application Deployment
Agile methodology
Common infrastructure provisioning and automation tools
Skills in:
Analyzing complex technical problems and developing workable solutions.
Identify and analyze cybersecurity threats and risks
Troubleshooting, debugging and problem solving skills
Creating technical documents and procedures as it relates to cybersecurity.
Managing multiple conflicting tasks/deadlines.
Attention to detail and log analysis skills
Scripting/code reading abilities in languages like PowerShell and Terraform
Effective verbal and written communication of complex technical information.
Ability to:
Learn new security tools and technologies quickly
Effectively research and critical thinking abilities
Adapt to changing requirements and incident response
Show passion for security and continuous self-improvement
Communicate skills to translate technical concepts for non-technical audiences
Effectively assess areas of risk associated with information security.
Monitor for attacks and run appropriate defensive protocols during incidents.
Perform employee training against phishing and other forms of cyberattack.
Determine the validity of technology trend data.
Assist with the development of policy, plans, and strategies in compliance with laws, regulations, policies, and standards in support of organizational information security assurance.
Establish and maintain harmonious working relationships with co-workers, agency staff, and external contacts.
Work effectively in a professional team environment and independently.
Military Occupational Specialty (MOS) Codes:
Veterans, Reservists or Guardsmen with experience in the Military Occupational Specialty ( https://www.trs.texas.gov/files/trs-military-crosswalk.xlsx ) along with the minimum qualifications listed above may meet the minimum requirements and are highly encouraged to apply. Please contact Talent Acquisition at careers@trs.texas.gov with questions or for additional information.
To view all job vacancies, visit www.trs.texas.gov/careers or www.trs.csod.com/careersite.
For more information, visit www.trs.texas.gov.
Location:
1900 Aldrich Street
Austin, Texas, 78723
United States
Cloud Security Engineer
Requisition ID:
req1202
Employment Type:
Unclassified Regular Full-Time (URF)
Division:
Information Security Office
Compensation:
108,036.00 - 135,044.00, Annual Salary
Location:
Alpha
Job Closing:
April 11th at 5:00 pm, CST
WHO WE ARE:
Service, Respect, and Connection are core to the individual and collective TRS experience. We know that great service rests on a foundation of relationships that connect us all to an empowering and rewarding career. At TRS, we're inspired by our community who bring authenticity and commitment to our mission to improve the retirement security of public education employees and retirees throughout Texas.
As a group of achievers, we tap collaboration and innovation to raise the bar in performance, administering and counseling pensions and healthcare benefits to ensure certainty for the future of our members. We invite you to join us, where both personal and career growth are respected and where you can make a difference in our members' lives every day.
The Cloud Security Engineer is responsible for safeguarding cloud data, applications, and infrastructure through your expertise in cybersecurity operations, cloud security, and DevSecOps for TRS. The incumbent will leverage tools like SIEM, SAST, DAST/IAST and orchestration platforms to automate policy enforcement on off-premises applications and infrastructure; respond rapidly to incidents through skilled analysis of anomalies across networks, code, and cloud infrastructure; create and deliver secure service deployment training to share across IT and application owners; ensure compliance while fostering collaboration between application owners, IT operations, and security teams. This position will proactively work with the Information Security team, IT staff, and agency employees.
WHAT WILL YOU DO:
Cybersecurity Operations
Monitor security alerts, logs, and events from various tools like SIEM, firewalls, endpoints, etc. to detect any anomalies or potential incidents.
Collect, process, preserve, and analyze digital-related evidence to support network vulnerability mitigation and workplace investigations.
Investigate and analyze suspicious or unusual activity to determine if it poses a true security risk. This may involve looking at additional logs, files, network traffic, etc.
Validate and verify the root cause of any incidents and breaches that are identified. Support response and remediation efforts.
Respond to crises or urgent situations to mitigate immediate and potential threats. Use mitigation, preparedness, and response and recovery approaches. Investigate and analyze all relevant response activities.
Conduct application security reviews/testing (SAST, DAST, IAST, etc.) to identify vulnerabilities in code.
Work with application owners and IT to remediate vulnerabilities and implement secure cloud orchestration best practices.
Perform security architecture reviews of software/api designs.
Coordinate with Governance, Risk, and Compliance (GRC) team on conducting risk analyses (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change and provide recommendations for mitigation strategies/solutions.
Read, interpret, and execute simple scripts on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).
Provide an accurate technical evaluation of the software application, system, or network, documenting the security posture, capabilities, and vulnerabilities against relevant cybersecurity compliances.
Mitigate/correct security deficiencies identified during security testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative.
Assesses and monitors cybersecurity events related to system implementation and testing practices.
Provide after-hours support for information security functions.
Strategic Support
Analyze collected information to identify vulnerabilities and potential exploitation.
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
Build and maintain metrics for tracking improvements and deficiencies in the security of processes, systems, and programs
Performs related work as assigned.
WHAT WILL YOU BRING:
Required Education
Bachelor's degree from an accredited college or university in Cybersecurity, Information Security or a closely related field.
High school diploma or equivalent and additional full-time experience in cybersecurity, information security, systems analysis, programming, computer operations, IT business analysis or similarly related experience may be substituted on an equivalent year-for-year basis.
Required Experience
Three (3) years of full-time directly related, progressively responsible experience in cybersecurity, information security, systems analysis, programming, computer operations, IT business analysis or similarly related experience.
One (1) year of full-time directly related, progressively responsible experience developing and training employees on security/privacy policies, data handling practices and procedures, and legal obligations or similarly related experience.
One (1) year of experience conducting IT audits and needs analysis to improve business process solution s. As well as developing and writing IT policies, procedures, and audit responses or similarly related experience.
Experience may be concurrent.
A master's degree or doctoral degree in a directly related field may be substituted on an equivalent year-for-year basis.
Required Registration, Certification, or Licensure
Certification as a Certified Information Systems Security Professional (CISSP) or other security related certifications.
Knowledge, Skills, and Abilities
Knowledge of:
Computer systems and technology limitations, capabilities, and secure implementations.
Information security systems, controls, methodologies, practices, and regulations, including data encryption and information protection.
National and international laws, regulations, policies, along with ethics as they relate to cybersecurity/privacy.
Risk management approaches in regard to information security and privacy.
Applicable state and federal laws, statutes, Presidential Directives, executive branch guidelines related to information security or cybersecurity.
Current and emerging cyber technologies and cyber threats.
Defensive protocols and countermeasures, incident response, vulnerability management, and event analysis.
Knowledge of common cybersecurity frameworks and compliance standards
Familiarity with security tools, technologies, and best practices
Security hardware and software options, including the network artifacts they induce and their effects on exploitation.
Secure System Development Lifecycles, Pipelining, and Cloud Application Deployment
Agile methodology
Common infrastructure provisioning and automation tools
Skills in:
Analyzing complex technical problems and developing workable solutions.
Identify and analyze cybersecurity threats and risks
Troubleshooting, debugging and problem solving skills
Creating technical documents and procedures as it relates to cybersecurity.
Managing multiple conflicting tasks/deadlines.
Attention to detail and log analysis skills
Scripting/code reading abilities in languages like PowerShell and Terraform
Effective verbal and written communication of complex technical information.
Ability to:
Learn new security tools and technologies quickly
Effectively research and critical thinking abilities
Adapt to changing requirements and incident response
Show passion for security and continuous self-improvement
Communicate skills to translate technical concepts for non-technical audiences
Effectively assess areas of risk associated with information security.
Monitor for attacks and run appropriate defensive protocols during incidents.
Perform employee training against phishing and other forms of cyberattack.
Determine the validity of technology trend data.
Assist with the development of policy, plans, and strategies in compliance with laws, regulations, policies, and standards in support of organizational information security assurance.
Establish and maintain harmonious working relationships with co-workers, agency staff, and external contacts.
Work effectively in a professional team environment and independently.
Military Occupational Specialty (MOS) Codes:
Veterans, Reservists or Guardsmen with experience in the Military Occupational Specialty ( https://www.trs.texas.gov/files/trs-military-crosswalk.xlsx ) along with the minimum qualifications listed above may meet the minimum requirements and are highly encouraged to apply. Please contact Talent Acquisition at careers@trs.texas.gov with questions or for additional information.
To view all job vacancies, visit www.trs.texas.gov/careers or www.trs.csod.com/careersite.
For more information, visit www.trs.texas.gov.