Senior Manager, Information Security Cloud and Application Engineering
π Job Overview
- Job Title: Senior Manager, Information Security Cloud and Application Engineering
- Company: QTS Data Centers
- Location: Suwanee, GA, United States
- Job Type: Full-time, On-site
- Category: Information Security, Cloud Engineering, Application Security
- Date Posted: June 25, 2025
- Experience Level: 10+ years
- Remote Status: On-site (10% travel required)
π Role Summary
- Lead a team of information security engineers to protect QTS' information systems and data in cloud and application environments.
- Develop and implement comprehensive information security policies, procedures, and plans.
- Manage access controls and permissions for cloud accounts and applications.
- Oversee the design, implementation, and management of security solutions for cloud and application environments.
- Ensure compliance with QTS Security standards, regulatory requirements, and industry standards.
- Collaborate with other IT teams to integrate security measures into all cloud-based solutions.
π Enhancement Note: This role requires a strong understanding of information security principles and practices, as well as experience managing a team of security professionals. The ideal candidate will have a proven track record in cloud security and a deep understanding of emerging threats and trends in the industry.
π» Primary Responsibilities
- Security Strategy & Planning: Develop and implement comprehensive information security strategies, policies, and plans to safeguard QTS' information systems and data.
- Access Control Management: Manage access controls and permissions for cloud accounts and applications to ensure only authorized users can access sensitive data.
- Security Solutions Design & Management: Oversee the design, implementation, and management of security solutions for cloud and application environments, including security analytics platforms and incident response infrastructure.
- Compliance & Risk Management: Ensure compliance with QTS Security standards, regulatory requirements, and industry standards. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements.
- Threat Monitoring & Incident Response: Monitor and analyze security logs and alerts to identify potential threats. Lead incident response efforts and investigations in the event of a security breach.
- Team Leadership & Development: Provide guidance and training to employees on best practices for cloud security. Foster a culture of security awareness and continuous improvement within the team.
π Enhancement Note: This role requires strong leadership skills and the ability to work effectively in a team environment. The ideal candidate will have excellent analytical, problem-solving, and decision-making abilities, as well as excellent communication skills, both written and verbal.
π Skills & Qualifications
Education: Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field.
Experience: Minimum of 10 years of experience in information security, with at least 4 years in a managerial role. Experience with cloud security, security analytics platforms, and incident response infrastructure is required.
Required Skills:
- Strong leadership skills and team management experience
- Excellent analytical, problem-solving, and decision-making abilities
- Excellent communication skills, both written and verbal
- Experience with cloud security, security analytics platforms, and incident response infrastructure
- Knowledge of regulatory compliance requirements related to information security (a plus)
Preferred Skills:
- Professional information security certification (CISSP, CISM, or equivalent)
- Experience with regulatory compliance requirements related to information security
- Knowledge of emerging threats and trends in cloud security
π Enhancement Note: While not explicitly stated, having experience with specific cloud providers (e.g., AWS, Azure, Google Cloud) and familiarity with relevant security tools and frameworks (e.g., NIST, ISO 27001, CIS Benchmarks) would be beneficial for this role.
π Web Portfolio & Project Requirements
Portfolio Essentials:
- Security Strategy & Planning: Provide examples of security strategies and plans you've developed and implemented, highlighting their impact on protecting sensitive data and reducing risks.
- Access Control Management: Demonstrate your ability to manage access controls and permissions for cloud accounts and applications. Include case studies or projects that showcase your approach to access control management.
- Security Solutions Design & Management: Showcase your experience in designing, implementing, and managing security solutions for cloud and application environments. Include projects that highlight your use of security analytics platforms and incident response infrastructure.
- Compliance & Risk Management: Provide examples of security assessments and audits you've conducted, and the improvements you've recommended to address identified vulnerabilities.
- Threat Monitoring & Incident Response: Demonstrate your ability to monitor and analyze security logs and alerts, and lead incident response efforts. Include case studies or projects that showcase your approach to threat monitoring and incident response.
Technical Documentation:
- Security Policies & Procedures: Provide documentation of security policies and procedures you've developed and implemented, highlighting their effectiveness in protecting sensitive data.
- Security Solution Design Documents: Include design documents for security solutions you've implemented, detailing the architecture, configuration, and testing processes used.
- Incident Response Plans: Provide incident response plans you've developed and tested, demonstrating your approach to preparing for and responding to security incidents.
π Enhancement Note: While not explicitly stated, having a portfolio that demonstrates your ability to translate technical security threats into business risks and strategies would be beneficial for this role.
π΅ Compensation & Benefits
Salary Range: Based on market research for senior information security roles in the Atlanta, GA area, the estimated salary range for this role is $140,000 - $180,000 per year. This estimate takes into account the required experience level, regional cost of living, and industry standards for senior information security roles.
Benefits:
- Medical, dental, and vision insurance
- Life and disability insurance
- 401(k) retirement plan
- Flexible spending and HSA accounts
- Paid holidays and time off
- Paid volunteer days
- Employee assistance program
- Tuition assistance
- Parental and military leave assistance
- QTS scholarship for dependents
- Wellness program
- Bonus eligibility
π Enhancement Note: The provided salary range is an estimate based on market research and may vary depending on the candidate's experience, skills, and the company's internal compensation structure.
## π― Team & Company Context
π’ Company Culture
Industry: QTS is a global leader in data center, cloud, and managed services, providing secure, compliant, and scalable infrastructure solutions for enterprise and hyperscale customers.
Company Size: QTS is a large organization with a significant presence in the data center and cloud services industry. This means that the information security team will have ample resources and support to implement robust security measures and stay up-to-date with emerging threats and trends.
Founded: QTS was founded in 2005 and has since grown to become one of the largest data center providers in the world, with a strong focus on security, compliance, and customer satisfaction.
Team Structure:
- The information security team is part of the broader IT organization, working closely with other teams such as cloud engineering, application development, and infrastructure management.
- The team is led by the Senior Manager, Information Security Cloud and Application Engineering, who reports directly to the Vice President of Information Security.
- The team consists of information security engineers, analysts, and specialists, each with their own areas of expertise and responsibility.
Development Methodology:
- QTS follows a structured, risk-based approach to information security, with a focus on continuous improvement and adaptation to emerging threats and trends.
- The team uses Agile methodologies for security project management, with regular sprint planning and review sessions to ensure that security initiatives align with business objectives and customer needs.
- QTS is committed to staying up-to-date with industry best practices and standards, and regularly reviews and updates its security policies, procedures, and guidelines to ensure they remain relevant and effective.
Company Website: https://www.qtsdatacenters.com/
π Enhancement Note: QTS' focus on security, compliance, and customer satisfaction makes it an attractive employer for information security professionals looking to make a significant impact in a dynamic and challenging environment.
π Career & Growth Analysis
Information Security Career Level: This role is a senior management position within the information security function. As such, it requires a high level of experience, expertise, and leadership skills. The ideal candidate will have a proven track record in cloud security and a deep understanding of emerging threats and trends in the industry.
Reporting Structure: The Senior Manager, Information Security Cloud and Application Engineering, reports directly to the Vice President of Information Security. This means that the role has a high degree of visibility and influence within the organization, and the successful candidate will have the opportunity to shape QTS' information security strategy and roadmap.
Technical Impact: This role has a significant impact on QTS' ability to protect its information systems and data, and to maintain the trust of its customers. The successful candidate will be responsible for developing and implementing comprehensive information security strategies, policies, and plans, and for managing a team of highly skilled information security professionals.
Growth Opportunities:
- Technical Leadership: As QTS continues to grow and expand its cloud and managed services offerings, there will be opportunities for the successful candidate to take on additional responsibilities and advance their career within the information security function.
- Emerging Technology Adoption: QTS is committed to staying at the forefront of emerging threats and trends in cloud security. As such, the successful candidate will have the opportunity to gain experience with new security tools, technologies, and methodologies, and to contribute to QTS' thought leadership in the industry.
- Architecture Decision-Making: As QTS' cloud and managed services offerings continue to evolve, the successful candidate will have the opportunity to contribute to architecture decisions that shape the future of QTS' information security capabilities.
π Enhancement Note: This role offers significant opportunities for career growth and development within the information security function. The successful candidate will have the opportunity to make a significant impact on QTS' information security strategy and roadmap, and to contribute to the company's continued success in the data center and cloud services industry.
π Work Environment
Office Type: QTS' Suwanee, GA office is a modern, collaborative workspace designed to foster innovation and teamwork. The information security team works closely with other IT teams, and has access to the latest tools and technologies required to protect QTS' information systems and data.
Office Location(s): QTS' Suwanee, GA office is conveniently located near major highways and public transportation, making it easily accessible for employees.
Workspace Context:
- Collaborative Workspace: The information security team works closely with other IT teams, and has access to collaborative workspaces and meeting rooms designed to facilitate teamwork and knowledge sharing.
- Specialized Tools & Technologies: The information security team has access to specialized tools and technologies required to protect QTS' information systems and data, including security analytics platforms, incident response infrastructure, and cloud security tools.
- Cross-Functional Collaboration: The information security team works closely with other IT teams, including cloud engineering, application development, and infrastructure management. This cross-functional collaboration ensures that security is integrated into all aspects of QTS' cloud and managed services offerings.
Work Schedule: The information security team works a standard 40-hour workweek, with flexible scheduling options to accommodate individual needs and preferences. The team is expected to be available for on-call rotations to provide 24/7 coverage for security incidents and emergencies.
π Enhancement Note: QTS' modern, collaborative workspace and flexible scheduling options make it an attractive employer for information security professionals looking for a dynamic and challenging work environment.
π Application & Technical Interview Process
Interview Process:
- Phone Screen: A brief phone call to discuss your qualifications, experience, and career goals.
- Technical Deep Dive: A comprehensive technical interview focused on your experience with cloud security, security analytics platforms, and incident response infrastructure. This interview may include hands-on exercises and case studies.
- Behavioral & Cultural Fit: An interview focused on your leadership skills, teamwork, and cultural fit with QTS' values and mission.
- Final Review: A final review with QTS' hiring manager and other key stakeholders to ensure that your qualifications, experience, and cultural fit meet the organization's needs.
Portfolio Review Tips:
- Security Strategy & Planning: Highlight your experience developing and implementing comprehensive information security strategies, policies, and plans. Include examples of how your strategies have protected sensitive data and reduced risks.
- Access Control Management: Demonstrate your ability to manage access controls and permissions for cloud accounts and applications. Include case studies or projects that showcase your approach to access control management.
- Security Solutions Design & Management: Showcase your experience in designing, implementing, and managing security solutions for cloud and application environments. Include projects that highlight your use of security analytics platforms and incident response infrastructure.
- Compliance & Risk Management: Provide examples of security assessments and audits you've conducted, and the improvements you've recommended to address identified vulnerabilities.
- Threat Monitoring & Incident Response: Demonstrate your ability to monitor and analyze security logs and alerts, and lead incident response efforts. Include case studies or projects that showcase your approach to threat monitoring and incident response.
Technical Challenge Preparation:
- Cloud Security: Brush up on your knowledge of cloud security best practices, and familiarize yourself with the specific cloud providers used by QTS (e.g., AWS, Azure, Google Cloud).
- Security Analytics Platforms: Familiarize yourself with the security analytics platforms used by QTS, and practice using them to monitor and analyze security logs and alerts.
- Incident Response Infrastructure: Brush up on your knowledge of incident response best practices, and familiarize yourself with the incident response infrastructure used by QTS.
ATS Keywords: (Organized by category)
- Cloud Security: AWS, Azure, Google Cloud, cloud security best practices, cloud security architecture, cloud security compliance, cloud security governance, cloud security risk management, cloud security incident response
- Security Analytics Platforms: SIEM, SOAR, threat intelligence, security information and event management, security orchestration, automation, and response
- Incident Response Infrastructure: incident response plan, incident response team, incident response process, incident response testing, incident response training, incident response communication
- Leadership & Teamwork: team management, team leadership, team building, team collaboration, cross-functional teamwork, stakeholder communication, change management, conflict resolution
- Information Security: information security policy, information security procedure, information security standard, information security guideline, information security compliance, information security risk management, information security incident response, information security awareness, information security training
- Regulatory Compliance: HIPAA, PCI DSS, NIST, ISO 27001, CIS Benchmarks, COBIT, Sarbanes-Oxley, GDPR, CCPA, data privacy, data protection, data governance, data management
π Enhancement Note: QTS uses a variety of ATS systems to manage its recruitment and hiring processes. Familiarize yourself with the specific ATS system used by QTS, and optimize your resume and application materials to ensure that they are easily searchable and discoverable by QTS' recruiters and hiring managers.
π Technology Stack & Web Infrastructure
Cloud Security:
- AWS: Amazon Web Services is a popular cloud provider used by QTS to deliver secure, scalable, and reliable cloud services. Familiarity with AWS security best practices, services, and features is required for this role.
- Azure: Microsoft Azure is another popular cloud provider used by QTS. Familiarity with Azure security best practices, services, and features is beneficial for this role.
- Google Cloud: Google Cloud Platform is a third major cloud provider used by QTS. Familiarity with Google Cloud security best practices, services, and features is beneficial for this role.
Security Analytics Platforms:
- Splunk: Splunk is a popular security information and event management (SIEM) platform used by QTS to monitor and analyze security logs and alerts. Familiarity with Splunk is required for this role.
- IBM QRadar: IBM QRadar is a security orchestration, automation, and response (SOAR) platform used by QTS to automate and streamline incident response processes. Familiarity with IBM QRadar is beneficial for this role.
Incident Response Infrastructure:
- TheHive: TheHive is an open-source incident response platform used by QTS to manage and track security incidents and investigations. Familiarity with TheHive is required for this role.
- Phantom: Phantom is an open-source incident response automation platform used by QTS to automate and streamline incident response processes. Familiarity with Phantom is beneficial for this role.
π Enhancement Note: Familiarize yourself with the specific cloud security, security analytics, and incident response technologies used by QTS, and optimize your portfolio and application materials to highlight your relevant skills and experience.
π₯ Team Culture & Values
QTS Values:
- Customer Focus: QTS is committed to delivering exceptional customer experiences, and to understanding and meeting the unique needs of each of its customers.
- Integrity: QTS is committed to acting with honesty, transparency, and accountability in all aspects of its business.
- Expertise: QTS is committed to delivering high-quality, innovative solutions that leverage the latest technologies and industry best practices.
- Collaboration: QTS is committed to fostering a culture of teamwork, knowledge sharing, and continuous improvement.
- Innovation: QTS is committed to driving innovation and disruption in the data center and cloud services industry, and to staying at the forefront of emerging threats and trends.
Collaboration Style:
- Cross-Functional Integration: The information security team works closely with other IT teams, including cloud engineering, application development, and infrastructure management. This cross-functional integration ensures that security is integrated into all aspects of QTS' cloud and managed services offerings.
- Code Review Culture: The information security team has a strong code review culture, with a focus on ensuring that all changes to QTS' information systems and data are thoroughly reviewed and tested before they are deployed.
- Knowledge Sharing: The information security team is committed to fostering a culture of knowledge sharing and continuous learning. Team members are encouraged to share their expertise and experience with their colleagues, and to stay up-to-date with emerging threats and trends in the industry.
π Enhancement Note: QTS' focus on customer focus, integrity, expertise, collaboration, and innovation makes it an attractive employer for information security professionals looking for a dynamic and challenging work environment.
β‘ Challenges & Growth Opportunities
Technical Challenges:
- Cloud Security: As QTS continues to expand its cloud and managed services offerings, the information security team will face new and evolving challenges in protecting QTS' information systems and data in cloud environments.
- Emerging Threats & Trends: The information security landscape is constantly evolving, with new threats and vulnerabilities emerging on a regular basis. The successful candidate will need to stay up-to-date with emerging threats and trends, and to adapt QTS' security strategies and solutions to address them.
- Regulatory Compliance: As QTS' customer base continues to grow and diversify, the information security team will face new and evolving challenges in ensuring that QTS' information systems and data are compliant with relevant regulations and standards.
Learning & Development Opportunities:
- Cloud Security Training: QTS offers a range of training and development opportunities to help information security professionals stay up-to-date with the latest cloud security best practices, technologies, and trends.
- Conference Attendance: QTS encourages its information security professionals to attend industry conferences and events to network with their peers, learn from experts, and stay up-to-date with emerging threats and trends.
- Certification & Certification: QTS supports its information security professionals in obtaining relevant certifications, such as the Certified Information Systems Security Professional (CISSP) or Certified in Risk and Information Systems Control (CRISC) designation.
- Technical Mentorship: QTS offers a range of technical mentorship opportunities to help information security professionals develop their skills and advance their careers.
π Enhancement Note: This role offers significant opportunities for technical growth and development within the information security function. The successful candidate will have the opportunity to make a significant impact on QTS' information security strategy and roadmap, and to contribute to the company's continued success in the data center and cloud services industry.
π‘ Interview Preparation
Technical Questions:
- Cloud Security: Be prepared to discuss your experience with cloud security best practices, and to demonstrate your understanding of the specific cloud providers used by QTS (e.g., AWS, Azure, Google Cloud).
- Security Analytics Platforms: Be prepared to discuss your experience with security information and event management (SIEM) platforms, and to demonstrate your ability to monitor and analyze security logs and alerts using tools such as Splunk.
- Incident Response Infrastructure: Be prepared to discuss your experience with incident response best practices, and to demonstrate your ability to lead incident response efforts using tools such as TheHive and Phantom.
Company & Culture Questions:
- QTS Values: Be prepared to discuss your understanding of QTS' values, and to provide examples of how you have demonstrated these values in your previous roles.
- Teamwork & Collaboration: Be prepared to discuss your experience working in a team environment, and to provide examples of how you have collaborated with other teams to achieve shared goals.
- Adaptability: Be prepared to discuss your ability to adapt to new and evolving challenges, and to provide examples of how you have successfully navigated change in your previous roles.
Portfolio Presentation Strategy:
- Security Strategy & Planning: Highlight your experience developing and implementing comprehensive information security strategies, policies, and plans. Include examples of how your strategies have protected sensitive data and reduced risks.
- Access Control Management: Demonstrate your ability to manage access controls and permissions for cloud accounts and applications. Include case studies or projects that showcase your approach to access control management.
- Security Solutions Design & Management: Showcase your experience in designing, implementing, and managing security solutions for cloud and application environments. Include projects that highlight your use of security analytics platforms and incident response infrastructure.
- Compliance & Risk Management: Provide examples of security assessments and audits you've conducted, and the improvements you've recommended to address identified vulnerabilities.
- Threat Monitoring & Incident Response: Demonstrate your ability to monitor and analyze security logs and alerts, and lead incident response efforts. Include case studies or projects that showcase your approach to threat monitoring and incident response.
π Enhancement Note: QTS' interview process is designed to assess your technical skills, leadership abilities, and cultural fit with the organization. Be prepared to provide specific, practical examples of your experience and achievements, and to demonstrate your ability to make a significant impact on QTS' information security strategy and roadmap.
π Application Steps
To apply for this Senior Manager, Information Security Cloud and Application Engineering position at QTS:
- Customize Your Resume: Tailor your resume to highlight your relevant experience and skills, and to optimize it for QTS' ATS system.
- Prepare Your Portfolio: Ensure that your portfolio demonstrates your experience and achievements in cloud security, security analytics, and incident response. Include case studies or projects that showcase your approach to security strategy, access control management, and incident response.
- Research QTS: Familiarize yourself with QTS' values, culture, and business objectives. Prepare thoughtful and insightful responses to company and culture-related interview questions.
- Practice Technical Interview Questions: Brush up on your knowledge of cloud security, security analytics, and incident response technologies, and practice answering technical interview questions using the guidance provided in this document.
- Prepare for Behavioral Interview Questions: Reflect on your leadership abilities, teamwork skills, and adaptability, and prepare specific, practical examples of your experience and achievements that demonstrate these qualities.
- Review the Job Description: Ensure that you have addressed all the key responsibilities, required skills, and qualifications listed in the job description, and that your application materials are tailored to this specific role.
β οΈ Important Notice: This enhanced job description includes AI-generated insights and web development/server administration industry-standard assumptions. All details should be verified directly with the hiring organization before making application decisions.
Application Requirements
Candidates should have a Bachelor's degree in a relevant field and a minimum of 10 years of experience in information security, including 4 years in a managerial role. Professional certifications such as CISSP or CISM are preferred.