Overview
Skills
Job Details
AWS Security Engineer
Location: Washington, DC(Onsite)
Client: federal government
Required: public trust clearance
Design and implement security controls in AWS environments using services such as IAM, KMS, CloudTrail, Security Hub and Config.
- Lead or support security authorization efforts (FedRAMP, FISMA) by preparing and maintain System Security Plans (SSPs), POA&Ms, Contingency Plans, and other artifacts.
- Conduct vulnerability scans, security assessments, and risk analyses using tools like Nessus or AWS Security Hub.
- Serve as the security POC and collaborate with stakeholders to ensure systems remain compliant with NIST 800-53 and agency specific policies.
- Monitor cloud environments for anomalous activity, enforce access control policies, and support incident response efforts.
- Review and advise on DevSecOps practices, including secure CI/CD pipelines, automate compliance checks, and secure container usage.
- Coordinate with the AO, ISSM, and SOC teams to manage system risk posture and track remediation activities.
7+ years of cybersecurity experience, including at least 3+ years in cloud environments.
- Hands-on experience implementing and assessing NIST 800-53 controls in a federal cloud context.
- Experience with cloud-native logging, monitoring, and SIEM integration.
- Experience with performing ISSO responsibilities within federal government programs.
- Strong scripting experience in Python, Bash, or PowerShell.
- Strong experience with DevOps tools such as Jenkins or CodePipeline.
- Proficiency with Linux/Windows server environment and cloud networking concepts (e.g., DNS, VPC, VPN, etc.)
- Familiarity/experience with artificial intelligence (AI) cloud tooling is a huge plus (e.g., Amazon BedRock, Lex, Comprehend, etc.)