Cloud Security Engineer

Glean Glean · Enterprise · Engineering

Glean is seeking a Cloud Security Engineer to architect and secure its cloud infrastructure on AWS and Azure. The role involves identifying security gaps, implementing cloud-native security technologies, developing security features for authentication, authorization, and audit logging, and analyzing security logs. The engineer will collaborate with cross-functional teams, leverage software engineering skills, and contribute to the overall security strategy of the Work AI platform.

What you'd actually do

  1. Collaborate with cross-functional teams to design and architect secure cloud infrastructure solutions on AWS and Azure.
  2. Identify potential security vulnerabilities and gaps in existing infrastructure and propose remediation plans.
  3. Implement cloud-native security technologies and best practices to address identified gaps.
  4. Analyze security logs and metrics to proactively detect and respond to security incidents.
  5. Develop and deploy security controls, such as identity and access management (IAM), network security policies, and encryption mechanisms.

Skills

Required

  • Strong software engineering skills
  • Proficiency in at least one programming language (e.g., Python, Go, Java)
  • Experience with cloud platforms (AWS or Azure)
  • Familiarity with cloud-native security tools and services (e.g., AWS IAM, GCP Identity and Access Management, VPC security)
  • Knowledge of authentication and authorization protocols and technologies (e.g., OAuth, OpenID Connect)
  • Strong problem-solving skills
  • Ability to work independently and collaboratively
  • Excellent communication skills

Nice to have

  • Willingness to become proficient in both AWS and Azure
  • Familiarity with cloud native development practices in AWS/Azure is a plus

What the JD emphasized

  • secure cloud infrastructure
  • security gaps
  • security posture
  • security-specific features
  • authentication, authorization, and audit logging (AAA)
  • security strategy
  • security vulnerabilities
  • security logs
  • security incidents
  • security controls
  • security best practices