Job Summary: The Cloud Security Engineer is responsible for planning, implementing, upgrading, and monitoring security-based measures for the protection of the organization's cloud-based digital platforms and related data. This role may be charged with analyzing and revising existing cloud infrastructure and implementing new and enhanced security related designs and methodologies. In addition, this position is familiar with and helps institute best practices that meet or exceed FedRAMP, NIST, and Cybersecurity Maturity Model Certification (CMMC). The Cloud Security Engineer focuses on the secure configuration and deployment of services within Microsoft GCC High and other platforms to support business operations, and ensures high performance and reliability of technology services that support the firm's mission. Job Duties:
- Collaborates with Public Sector and BDO National IT teams on standards, configuration recommendations, and best practices for the secure management of Microsoft 365 GCC High services, including Office, Entra ID, Intune, Defender, and Purview
- Institutes policies for identity, device, and access management using Zero Trust principles and security baselines
- Reviews results from configuration management/testing, profiling, and assessment tooling to address vulnerabilities, misconfigurations, and/or access risks
- Implements, maintains, and monitors backup and disaster recovery strategies for M365 environment
- Participates in the Change Control Board
- Monitors for and investigates emerging cyber threats in BDO Public Sector cloud environment, and works with staff on recommending and implementing defensive actions
- Contributes to System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and other artifacts for audit readiness
- Performs maintenance and enhancements on existing security alerts to reduce false positives
- Leads the remediation efforts of vulnerabilities within cloud resources
- Leads the Incident Response Team which includes monitoring for and determining Indicators of Compromise
- Collaborates with security operations professionals to analyze triaged security alerts to determine the appropriate escalation and remediation paths
- Designs and implements security related technologies such as MFA, FIDO2, endpoint detection and response (EDR), and mobile device management (MDM) within a GCC High tenant
- Aligns enterprise IT planning with cybersecurity risk management strategies using NIST SP 800-171 and other applicable frameworks
- Performs and reports phishing testing and develops necessary training
- Escalates critical issues to management
- Documents and maintains policies and procedures
- Other duties as required
Supervisory Responsibilities:
- Directs day-to-day activities/workload of staff, as needed
Qualifications, Knowledge, Skills, and Abilities: Education:
- High school diploma or GED, required
- Bachelor's degree in Cloud Computing, Information Technology, Information Science, Informatics, or Information Systems, preferred
Experience:
- Three (3) or more years of experience providing IT systems security support or incident response, required
License/Certifications:
- SC-100 - Microsoft Certified Cybersecurity Architect Expert, preferred
- AZ-305 - Azure Solutions Architect Expert, preferred
- AZ-500 - Azure Security Engineer Associate, preferred
Software:
- Proficiency with Microsoft Intune, Entra ID/Azure AD, Microsoft 365 Admin Center, and Microsoft Defender for Endpoint, required
- Proficiency with Microsoft Office Suite, preferred
- Proficiency with Power BI, Apple Business Manager, and MacOS and iOS management via Intune, preferred
Language:
Other Knowledge, Skills, and Abilities:
- Strong verbal and written communication skills
- Excellent interpersonal and customer relationship skills
- Capacity to work in a deadline-driven environment while handling multiple complex projects/tasks simultaneously with a focus on details
- Capable of successfully multi-tasking while working independently or within a group environment
- Familiar with various regulatory policies (PCI, HIPAA, GLBA and other statutory regulations) as they relate to data security and IT policies, procedures, and standards
- Basic awareness of PCI-DSS, ISO 2700x, FISMA, and other industry recommended security frameworks
- Strong understanding of security breach detection and mitigation
- Ability to rely on extensive experience and judgment to plan and accomplish goals
- Capable of working well under pressure while dealing with unexpected issues in a professional manner
- Capacity to communicate and interact with all levels of employees and management
- Ability to interact and build consensus among people
- Ability to work after standard business hours and travel, as needed
- Ability to design capabilities to find solutions to less common and more complex system problems
|