AWS Cloud Security Engineer

WRS Health
Full_time

📍 Job Overview

  • Job Title: AWS Cloud Security Engineer
  • Company: WRS Health
  • Location: Remote (United States)
  • Job Type: Contract
  • Category: DevOps / Cloud Security
  • Date Posted: June 12, 2025
  • Experience Level: 5-10 years
  • Remote Status: Remote Solely

🚀 Role Summary

  • Primary Responsibility: Ensure the security and compliance of WRS Health's AWS cloud infrastructure.
  • Key Web Technology Aspects: AWS cloud security, vulnerability management, risk assessment, and security automation.
  • 📝 Enhancement Note: This role requires a strong background in cloud security, with a focus on AWS services and security best practices.

💻 Primary Responsibilities

  • 🔒 Monitor and manage user accounts: Ensure least privilege access, create and remove accounts as needed across Linux, AWS IAM, VOIP, Email, and other systems.
  • 🛡 Implement and maintain security controls: Architect, design, and deploy security solutions to protect AWS infrastructure and applications.
  • 🔎 Conduct vulnerability assessments: Research and evaluate new security technologies to address gaps and enable business opportunities.
  • 📊 Plan and implement security systems: Determine security requirements, specify intrusion detection methods, and direct equipment installation and calibration.
  • 🛠 Perform server administration tasks: Manage user accounts, security protocols, and network maintenance for Linux servers.
  • 🔍 Monitor and respond to issues: Review incoming data, use existing tools to respond to issues, and develop and test new technologies as needed.
  • 📅 Perform routine audits: Conduct regular audits of systems and perform nightly backups as directed.
  • 🌟 Provide technical support and mentoring: Collaborate with internal customers, elaborate on project statuses, and provide ad-hoc training and coaching.

🎓 Skills & Qualifications

Education: Bachelor's degree in technology or computer science is required.

Experience: 5+ years of experience in cloud infrastructure and information security, with 2+ years of hands-on experience in IaaS and PaaS on a global scale.

Required Skills:

  • Proficiency in Bash scripting
  • Strong experience with cloud virtualization technologies: Docker and AWS
  • Familiarity with AWS shared responsibility model from a security standpoint
  • Experience working with industry-leading vulnerability scanners and understanding vulnerability criticality using the Common Vulnerability Scoring methodology
  • Strong knowledge of operating systems, equipment, technology, and performance-monitoring tools
  • Linux Administration, AWS, Debian, Nagios or Icinga, DNS, HAProxy, Nginx, and FreePBX (a plus)

Preferred Skills:

  • Prior technical support experience
  • Time management skills
  • Clear written and verbal communication skills
  • Ability to work well under pressure and both independently and as part of a team

📊 Web Portfolio & Project Requirements

Portfolio Essentials:

  • Demonstrate a strong understanding of AWS security best practices and relevant security projects.
  • Showcase experience in vulnerability management, risk assessment, and security automation.
  • Highlight any security certifications or relevant training.

Technical Documentation:

  • Provide case studies or documentation showcasing security implementations, risk assessments, and remediation strategies.
  • Include any security-related code samples or scripts demonstrating your technical proficiency.

💵 Compensation & Benefits

Salary Range: $120,000 - $160,000 per year (USD) - Based on market research for remote AWS cloud security engineer roles with 5-10 years of experience.

Benefits: Not specified in the job listing.

Working Hours: Available during standard US business hours (9am-5pm EST)

🎯 Team & Company Context

Company Culture: WRS Health is a cloud-based EMR and practice management solutions provider, voted #1 EHR by PC Mag. They focus on constant enhancement of their products and services, including EHR, practice management, marketing, patient coordination, and billing.

Team Structure:

  • The AWS Cloud Security Engineer will work closely with the IT and security teams to ensure the security and compliance of WRS Health's AWS infrastructure.
  • They will also collaborate with internal customers to provide technical support and mentoring.

Development Methodology: Not specified in the job listing.

Company Website: WRS Health

📝 Enhancement Note: WRS Health is a mid-sized company focused on providing integrated cloud-based solutions to its clients. The AWS Cloud Security Engineer will play a crucial role in maintaining the security and compliance of their AWS infrastructure, working closely with various teams to ensure the company's security objectives are met.

📈 Career & Growth Analysis

Web Technology Career Level: This role is suitable for an experienced AWS cloud security professional looking to advance their career in a mid-sized company focused on cloud-based solutions.

Reporting Structure: The AWS Cloud Security Engineer will report directly to the IT department and work closely with various teams to ensure the security and compliance of WRS Health's AWS infrastructure.

Technical Impact: This role will have a significant impact on the security and compliance of WRS Health's AWS infrastructure, ensuring that the company's data and applications are protected from potential threats.

Growth Opportunities:

  • Technical Growth: Expand your expertise in AWS cloud security, security automation, and emerging security technologies.
  • Leadership Growth: Mentor team members, provide coaching, and contribute to the enhancement of security team accomplishments and competences.
  • Career Progression: As the company grows, there may be opportunities to take on more senior roles or specialize in specific areas of interest.

📝 Enhancement Note: This role offers significant growth opportunities for an experienced AWS cloud security professional looking to advance their career in a mid-sized company focused on cloud-based solutions. The AWS Cloud Security Engineer will have the chance to make a significant impact on the security and compliance of WRS Health's AWS infrastructure and contribute to the enhancement of the security team's accomplishments and competences.

🌐 Work Environment

Office Type: Remote work environment, with no physical office location.

Office Location(s): N/A

Workspace Context:

  • Remote Work: The AWS Cloud Security Engineer will work remotely, collaborating with internal teams and customers via virtual communication tools.
  • Work Arrangement: The role requires availability during standard US business hours (9am-5pm EST).

Work Schedule: Not specified in the job listing.

📝 Enhancement Note: The remote work environment offers flexibility and the opportunity to work from anywhere in the United States. The AWS Cloud Security Engineer will collaborate with internal teams and customers via virtual communication tools, ensuring the security and compliance of WRS Health's AWS infrastructure.

📄 Application & Technical Interview Process

Interview Process:

  1. Technical Phone Screen: A phone or video call to discuss your AWS cloud security experience, focusing on your understanding of AWS security best practices, vulnerability management, and risk assessment.
  2. Technical Deep Dive: A deeper technical conversation focusing on specific AWS security services, security automation, and security incident response.
  3. Behavioral and Cultural Fit Assessment: An interview to assess your communication skills, problem-solving abilities, and cultural fit within the WRS Health team.
  4. Final Evaluation: A final interview or discussion with the hiring manager or other stakeholders to make a hiring decision.

Portfolio Review Tips:

  • Highlight your experience in AWS cloud security, vulnerability management, and security automation.
  • Include case studies or documentation showcasing your security implementations, risk assessments, and remediation strategies.
  • Demonstrate your technical proficiency through relevant code samples or scripts.

Technical Challenge Preparation:

  • Brush up on your AWS security knowledge, focusing on IAM, security groups, network ACLs, and AWS security services like Shield, WAF, and Macie.
  • Familiarize yourself with vulnerability management tools and processes.
  • Prepare for behavioral and situational interview questions, focusing on your problem-solving abilities and security incident response experience.

ATS Keywords: See the comprehensive list of relevant keywords provided at the end of this document.

📝 Enhancement Note: The interview process for this role will focus on assessing your technical expertise in AWS cloud security, vulnerability management, and security automation. Be prepared to discuss your experience in detail and demonstrate your technical proficiency through relevant case studies, documentation, and code samples.

🛠 Technology Stack & Web Infrastructure

Cloud Platform: AWS (Amazon Web Services)

Security Tools & Services:

  • AWS IAM (Identity and Access Management)
  • AWS Security Groups and Network ACLs
  • AWS Shield, WAF, and Macie
  • Vulnerability management tools (e.g., Nessus, OpenVAS, or other industry-leading tools)
  • Security information and event management (SIEM) systems (e.g., Splunk, LogRhythm, or other industry-leading tools)
  • Intrusion detection and prevention systems (e.g., Snort, Suricata, or other industry-leading tools)

📝 Enhancement Note: This role requires a strong understanding of AWS security best practices, relevant security tools, and services. Familiarize yourself with AWS security services, vulnerability management tools, and security incident response processes to excel in this role.

👥 Team Culture & Values

Web Development Values:

  • Security First: Prioritize security in all aspects of AWS cloud infrastructure management.
  • Continuous Improvement: Stay up-to-date with emerging security threats and best practices.
  • Collaboration: Work closely with internal teams and customers to ensure the security and compliance of WRS Health's AWS infrastructure.
  • Responsibility: Own the security of WRS Health's AWS cloud infrastructure and be accountable for any security incidents or breaches.

Collaboration Style:

  • Cross-Functional Collaboration: Work closely with internal teams, including IT, development, and customer success, to ensure the security and compliance of WRS Health's AWS infrastructure.
  • Knowledge Sharing: Contribute to the enhancement of security team accomplishments and competences by planning delivery of solutions, answering technical and procedural questions, and mentoring team members.
  • Regular Communication: Maintain open lines of communication with internal teams and customers to address security concerns and provide guidance on security best practices.

📝 Enhancement Note: WRS Health values a security-first approach, continuous improvement, collaboration, and responsibility in its AWS cloud infrastructure management. The AWS Cloud Security Engineer will play a crucial role in maintaining the security and compliance of WRS Health's AWS infrastructure, working closely with internal teams and customers to ensure the company's security objectives are met.

⚡ Challenges & Growth Opportunities

Technical Challenges:

  • Security Threat Landscape: Stay up-to-date with emerging security threats and best practices in AWS cloud security.
  • Vulnerability Management: Develop and maintain an effective vulnerability management program to identify, classify, remediate, and mitigate vulnerabilities in WRS Health's AWS cloud infrastructure.
  • Security Automation: Implement and maintain security automation processes to streamline security tasks and improve overall security posture.
  • Incident Response: Develop and maintain an effective incident response plan to minimize the impact of security incidents and breaches.

Learning & Development Opportunities:

  • AWS Security Certifications: Pursue relevant AWS security certifications (e.g., AWS Certified Security – Specialty) to enhance your knowledge and skills.
  • Industry Conferences and Events: Attend industry conferences and events to stay up-to-date with emerging security trends and best practices.
  • Mentorship and Leadership: Mentor team members, provide coaching, and contribute to the enhancement of security team accomplishments and competences.

📝 Enhancement Note: This role presents numerous technical challenges and growth opportunities for an experienced AWS cloud security professional. By staying up-to-date with emerging security threats and best practices, developing and maintaining effective vulnerability management and incident response programs, and implementing security automation processes, the AWS Cloud Security Engineer can make a significant impact on the security and compliance of WRS Health's AWS infrastructure.

💡 Interview Preparation

Technical Questions:

  • AWS Security Best Practices: Discuss AWS security best practices, focusing on IAM, security groups, network ACLs, and AWS security services like Shield, WAF, and Macie.
  • Vulnerability Management: Explain your experience with vulnerability management tools and processes, and how you would implement an effective vulnerability management program at WRS Health.
  • Incident Response: Describe your incident response experience and how you would develop and maintain an effective incident response plan at WRS Health.

Company & Culture Questions:

  • Security Culture: Discuss how you would contribute to WRS Health's security-first approach, continuous improvement, collaboration, and responsibility in AWS cloud infrastructure management.
  • Team Dynamics: Explain how you would work with internal teams, including IT, development, and customer success, to ensure the security and compliance of WRS Health's AWS infrastructure.
  • Customer Focus: Describe how you would provide guidance on security best practices to WRS Health's customers and ensure their data and applications are protected from potential threats.

Portfolio Presentation Strategy:

  • Case Studies: Prepare case studies or documentation showcasing your security implementations, risk assessments, and remediation strategies.
  • Technical Deep Dive: Be prepared to discuss your technical proficiency in AWS cloud security, vulnerability management, and security automation.
  • Behavioral and Situational Questions: Practice your responses to behavioral and situational interview questions, focusing on your problem-solving abilities and security incident response experience.

📝 Enhancement Note: Prepare thoroughly for the technical aspects of the interview, focusing on AWS security best practices, vulnerability management, and incident response. Familiarize yourself with WRS Health's security culture, team dynamics, and customer focus to excel in the behavioral and cultural fit assessment.

📌 Application Steps

To apply for this AWS Cloud Security Engineer position:

  1. Update Your Resume: Highlight your experience in AWS cloud security, vulnerability management, and security automation. Include relevant keywords and phrases to optimize your resume for applicant tracking systems (ATS).
  2. Prepare Your Portfolio: Showcase your experience in AWS cloud security, vulnerability management, and security automation through case studies, documentation, and code samples.
  3. Research WRS Health: Familiarize yourself with WRS Health's products, services, and security culture to demonstrate your understanding of the company and its mission.
  4. Practice Interview Questions: Prepare for technical, behavioral, and situational interview questions, focusing on your problem-solving abilities and security incident response experience.

📝 Enhancement Note: Tailor your resume and portfolio to highlight your experience in AWS cloud security, vulnerability management, and security automation. Research WRS Health's products, services, and security culture to demonstrate your understanding of the company and its mission, and prepare thoroughly for the interview process to increase your chances of success.


Content Guidelines (IMPORTANT: Do not include this in the output)

Web Technology-Specific Focus:

  • Tailor every section specifically to AWS cloud security, vulnerability management, and incident response.
  • Include AWS security best practices, relevant security tools, and services.
  • Emphasize AWS cloud security certifications, industry conferences, and mentorship opportunities.
  • Address security culture, team dynamics, and customer focus within WRS Health.

Quality Standards:

  • Ensure no content overlap between sections - each section must contain unique information.
  • Only include Enhancement Notes when making significant inferences about AWS cloud security, vulnerability management, and incident response processes.
  • Be comprehensive but concise, prioritizing actionable information over descriptive text.
  • Strategically distribute AWS cloud security, vulnerability management, and incident response-related keywords throughout all sections naturally.
  • Provide realistic salary ranges based on location, experience level, and AWS cloud security specialization.

Industry Expertise:

  • Include specific AWS security services, tools, and best practices relevant to the role.
  • Address AWS cloud security career progression paths and technical leadership opportunities.
  • Provide tactical advice for AWS cloud security portfolio development, live demonstrations, and project case studies.
  • Include AWS cloud security interview preparation and coding challenge guidance.
  • Emphasize AWS cloud security best practices, vulnerability management, and incident response principles.

Professional Standards:

  • Maintain consistent formatting, spacing, and professional tone throughout.
  • Use AWS cloud security, vulnerability management, and incident response industry terminology appropriately and accurately.
  • Include comprehensive benefits and growth opportunities relevant to AWS cloud security professionals.
  • Provide actionable insights that give AWS cloud security candidates a competitive advantage.
  • Focus on AWS cloud security team culture, cross-functional collaboration, and customer impact measurement.

Technical Focus & Portfolio Emphasis:

  • Emphasize AWS cloud security best practices, vulnerability management, and incident response principles.
  • Include specific portfolio requirements tailored to the AWS cloud security discipline and role level.
  • Address AWS cloud security case studies, documentation, and code samples.
  • Focus on problem-solving methods, security incident response, and AWS cloud security architecture.
  • Include technical presentation skills and stakeholder communication for AWS cloud security projects.

Avoid:

  • Generic business jargon not relevant to AWS cloud security roles.
  • Placeholder text or incomplete sections.
  • Repetitive content across different sections.
  • Non-technical terminology unless relevant to the specific AWS cloud security role.
  • Marketing language unrelated to AWS cloud security, vulnerability management, and incident response.

Generate comprehensive, AWS cloud security-focused content that serves as a valuable resource for AWS cloud security professionals seeking their next opportunity and preparing for technical interviews in the AWS cloud security industry.

ATS Keywords:

Programming Languages:

  • Bash
  • Python (for AWS SDK and automation tasks)
  • PowerShell (for Windows-based AWS services)

Web Frameworks & Libraries:

  • AWS SDK (Boto3, AWS CLI)
  • AWS Lambda
  • AWS CloudFormation
  • Terraform (for infrastructure as code)
  • Ansible (for configuration management)

Server Technologies:

  • AWS Elastic Compute Cloud (EC2)
  • AWS Elastic Kubernetes Service (EKS)
  • AWS Elastic Beanstalk
  • AWS Lambda
  • AWS Elastic Container Service (ECS)
  • AWS RDS
  • AWS DynamoDB
  • AWS Redshift
  • AWS Glue
  • AWS QuickSight

Databases:

  • AWS RDS (MySQL, PostgreSQL, MariaDB, Aurora)
  • AWS DynamoDB
  • AWS Redshift
  • AWS Glue

Tools:

  • AWS CloudTrail
  • AWS Config
  • AWS GuardDuty
  • AWS Shield
  • AWS WAF
  • AWS Macie
  • AWS Secrets Manager
  • AWS Key Management Service (KMS)
  • AWS Certificate Manager
  • AWS Systems Manager
  • AWS Trusted Advisor
  • AWS CloudWatch
  • AWS CloudFormation
  • AWS CloudTrail
  • AWS CloudFront
  • AWS API Gateway
  • AWS Amplify
  • AWS AppSync
  • AWS Cognito
  • AWS IAM (Identity and Access Management)
  • AWS Security Groups and Network ACLs
  • AWS VPC (Virtual Private Cloud)
  • AWS Direct Connect
  • AWS Transit Gateway
  • AWS VPN
  • AWS Direct Connect
  • AWS WorkSpaces
  • AWS AppStream
  • AWS Device Farm
  • AWS Elastic Inference
  • AWS Elastic Load Balancing
  • AWS Elastic Load Balancer
  • AWS Auto Scaling
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic File System (EFS)
  • AWS Simple Storage Service (S3)
  • AWS Elastic Block Store (EBS)
  • AWS Elastic

Application Requirements

Candidates must have a Bachelor's degree in technology or computer science and at least 5 years of experience in cloud infrastructure and information security. Proficiency in Bash scripting and familiarity with AWS security models are also required.