Overview
On Site
$$75 - $90 per hour
Full Time
Accepts corp to corp applications
Skills
AWS
CloudWatch
Prometheus
Grafana
Security Engineer
AWS security services
Incident management and ITIL processes
HIPAA
PCI-DSS
SOC 2
NIST
SIEM solutions (Elastic)
Job Details
Job Details
Location: Sacramento, CA
Type: Hybrid
Experience Level: Senior (10+ Years)
1 Seven (10) or more years of experience aligning IT systems with organizational business processes. At least five (10) years of that experience must be in a lead capacity.
Role: Security Engineer
Location: Sacramento, CA
Type: Hybrid
Experience Level: Senior (10+ Years)
Job Summary
My client is actively looking for a candidate with strong AWS operations and security experience, monitoring/observability skills, incident management, compliance frameworks, SIEM/Elastic, automation with Python/Bash, Kubernetes security, and an AWS SysOps certification.
Mandatory Qualifications
Candidates must meet all of the following:
1 Seven (10) years of experience with developing and implementing technical solutions to help mitigate security vulnerabilities.
2 Seven (10) years of IT experience with 3+ years in AWS operations
3 Three (10) years of experience with AWS security services (GuardDuty, Security Hub, WAF, Inspector)
4 Three (10) years of expert level experience monitoring and observability experience (CloudWatch, Prometheus, Grafana)
5 Five (10) years of experience with incident management and ITIL processes
6 Five (10) years of experience with aligning business with compliance frameworks (HIPAA, PCI-DSS, SOC 2, NIST)
7 Five (10) years of experience with log aggregation and SIEM solutions (Elastic)
8 Five (10) years of experience in automation and scripting (Python, Bash)
9 Three (10) years of experience with container security and Kubernetes security best practices
10 AWS Certified SysOps Administrator certification: Associate or Professional (required)*
Desirable Qualifications
1 Seven (10) or more years of experience aligning IT systems with organizational business processes. At least five (10) years of that experience must be in a lead capacity.
2 Five (10) years of experience supporting multi-account AWS Organizations environments, including governance guardrails, SCPs, and operational best practices.
3 Experience leading high-severity security incidents and developing incident response runbooks or post-incident analysis reports.
4 Seven (10) or more years of experience developing SIEM correlation rules, dashboards, and threat-detection content to improve alert quality and reduce false positives.
5 Possession of additional security-focused certifications such as AWS Security Specialty, CKS, CISSP, or GIAC certifications.*
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.