Associate Security Engineer

American Association of Motor VehiclesArlington, VA

About The Position

AAMVA’s Security team is looking for a highly motivated, self-starter, Associate Security Engineer, who enjoys the challenge of working in a fast-paced environment. The associate will be primarily tasked with the monitoring of information security systems in the Microsoft Azure environment. The associate will join and learn from a team of skilled engineers and become a trusted contributor to the Security DevOps practice. The associate must be detailed oriented, security-minded and highly reliable.

Requirements

  • 1–3 years of experience in a security operations, cloud security, or IT security role
  • General security certifications such as Security+, ISC2 CC
  • Technical certifications: SC-200, SC-300, AZ-104 or equivalent education
  • Excellent communication skills, written and oral
  • Excellent inter-personal skills; ability to interact with all layers of personnel
  • Practical experience administering Entra ID or Active Directory — user/group management, role assignments, and access reviews
  • Working knowledge of Microsoft Sentinel or another SIEM platform
  • Hands-on experience with Microsoft Azure (Entra ID, Azure Monitor, NSGs, RBAC)
  • Familiarity with KQL or similar query languages for log analysis
  • Familiarity with PowerShell and scripting
  • Understanding of fundamental security concepts: identity, network segmentation, least privilege, encryption at rest/in transit
  • Strong technical knowledge and solid hands-on experience in securing a Windows environment
  • Problem solving skills, autonomy, self-driven and ability to work under pressure
  • Ability to adapt quickly to new technologies and changing business requirements
  • United States citizenship required
  • Ability to obtain Public Trust clearance as needed

Nice To Haves

  • Working knowledge of FISMA and/or NIST publications is a definitive plus

Responsibilities

  • Monitor Microsoft Sentinel and Defender for Cloud alerts, triage incidents, and conduct initial investigations
  • Analyze logs from Azure Monitor, Entra ID, NSGs, and endpoint agents to identify anomalous or suspicious activity
  • Write and tune KQL queries for threat hunting, detection rules, and operational dashboards
  • Administer Entra ID (Azure AD) user and group lifecycle — provisioning, deprovisioning, and role assignments
  • Assist with vulnerability management workflows using Defender for Cloud and third-party tools
  • Assist with evidence collection and control mapping in support of the GRC team for SOC2 compliance
  • Participation in the development and maintenance of security policies, standards, procedures and knowledge-based articles
  • Develop detailed architecture security documents
  • Successfully engage in multiple initiatives simultaneously
  • Enhance and/or develop procedures and technologies to maximize security incident monitoring and response capabilities
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service