GAMA-1 is seeking a remote Cloud Security Specialist IV focused on AWS security operations, IAM, incident response, vulnerability management, and compliance in regulated environments. In partnership with the ISSO, this role is responsible for the overall protection of the enterprise cloud environment, ensuring data security and regulatory compliance while implementing best practices for access control, encryption, and threat mitigation.
The Cloud Security Specialist IV collaborates with engineering and operations teams to secure systems, support audits and compliance efforts, and drive effective security across AWS environments.
What You Will Do in This Role
The Cloud Security Specialist IV is responsible for leading AWS security operations, managing enterprise security controls and IAM, driving incident response and compliance, and serving as the SME and customer point of contact to ensure secure, resilient, and well-governed cloud environments.
Responsibilities include:
- Serve as the Cloud Security SME and primary customer point of contact
- Operate and monitor security controls across enterprise IT systems to support security operations
- Lead cloud security operations in AWS (e.g., WAF, GuardDuty, Macie, CloudTrail, CloudWatch, Control Tower), ensuring effective detection, response, and governance
- Perform security monitoring, incident response, and digital forensics using SIEM tools
- Direct and influence multi-disciplinary teams in the implementation and operation of cybersecurity controls across the enterprise
- Collaborate with application developers and database administrators to deliver innovative solutions to complex technology challenges and business requirements
- Provide subject matter expertise on information security architecture and systems engineering to IT and business stakeholders
- Drive automation of security controls, data, and processes to enhance metrics, visibility, and operational efficiency
- Implement and manage IAM solutions (ForgeRock, SailPoint, SSO, provisioning, lifecycle management) to ensure secure and effective access governance
- Assess risks and vulnerabilities and implement appropriate mitigation strategies
- Support audits, compliance activities, and execution of the security roadmap to ensure regulatory alignment and continuous improvement
What You Will Bring
Required Qualifications
- 8+ years of experience securing enterprise or mission-critical systems in regulated or government environments
- 5+ years of hands-on security operations experience, including monitoring, detection, and response
- 4+ years of AWS cloud security experience in production environments
- 4+ years of Windows and Linux security administration in enterprise environments
- Experience developing and enhancing security compliance reporting (e.g., AWS Security Hub, CloudTrail)
- Demonstrated experience identifying, mitigating, and managing vulnerabilities
- Experience supporting incident response activities and working with SIEM platforms
Preferred Qualifications
- Experience with IAM integrations (Active Directory, LDAP, enterprise databases), SSO, and identity lifecycle management
- Working knowledge of federal security frameworks and standards, including NIST 800-37/53, IRS 1075, and MARS-E
- Experience with vulnerability management, penetration testing, and enterprise firewall administration
- Scripting experience in Java, JavaScript, or shell scripting
Work authorization/security clearance requirements
- Ability to obtain a security clearance.
Work Environment
- This work is normally completed in a remote environment.
Physical Demands
- Prolonged periods of sitting at a desk and working on a computer.
- Must be able to access and navigate each department at the organization's and client facilities.
Travel Required
- No
Proficiency Requirement
- The employee is expected to demonstrate proficiency in all essential job functions, tools, and processes related to this position within the first 90 days of employment. This includes acquiring a thorough understanding of job-specific responsibilities, systems, and workflows as outlined during onboarding and training. Failure to meet this requirement may result in additional training, reassessment, or other actions as deemed necessary by management.