Cloud Security Engineer

As an Security Engineer, you will join a rapidly growing team to design, implement, maintain, and support Compass’ IT security layer. You will be part of an IT Systems Team that is responsible for designing and developing scalable, maintainable, highly available systems that meet business objectives and SLAs. Your primary responsibilities will focus on supporting the infrastructure security of Compass’ US based offices.

What We're Looking For

  • 5+ Years of Experience in IT as a Security Engineer or similar
  • Expertise in anti-virus software, intrusion detection, firewalls and content filtering
  • Knowledge of risk assessment tools, technologies and methods
  • Expertise in designing secure networks, systems and application architectures
  • Disaster recovery, computer forensic tools, technologies and methods
  • Planning, researching and developing security policies, standards and procedures
  • System administration, supporting multiple platforms and applications
  • Endpoint security solutions, including file integrity monitoring and data loss prevention
  • AWS and cloud platform as a service (PaaS) security
  • Automating security testing tools
  • Exceptional customer service and communication skills- helpful and calm under pressure
  • Proactive attitude, loves to work in a fast paced environment where the toolset is continuously evolving

At Compass You Will

  • Select and implement security tools, policies, and procedures in adherence to Compass’ security protocols
  • Develop and carry out information security plans and policies
  • Develop strategies to respond to and recover from a security breach
  • Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threats
  • Awareness training of the workforce on information security standards, policies and best practices
  • Coordinate with Network Team on installation and use of firewalls, data encryption and other security products and procedures
  • Conduct periodic network scans to find any vulnerability
  • Conduct penetration testing, simulating an attack on the system to find exploitable weaknesses
  • Monitor networks and systems for security breaches, through the use of software that detects intrusions and anomalous system behavior
  • Investigate security breaches
  • Lead incident response, including steps to minimize the impact and conducting

Back to top