Sr Cloud Security Engineer (Hybrid/Multi-Cloud)

ECS Tech IncFalls Church, VA
Hybrid

About The Position

Everforth ECS is seeking a Senior Cloud Security Engineer to work in our Falls Church, VA office. As a Senior Cloud Security Engineer, you will directly implement technical strategy for securing a massive hybrid ecosystem comprising 30,000+ physical sites and diverse multi-cloud tenants. You will be responsible for building the automated "guardrails" that protect our assets, data, and identity fabric across private data centers and public cloud environments. Your mission is to ensure a high-quality security posture through continuous efficacy assessments, fraud mitigation, and proactive threat detection.

Requirements

  • 8+ years in a technical Cybersecurity Engineering role, with at least 4 years focused on large-scale cloud or hybrid environments, and a portfolio of projects where AI or Machine Learning was directly applied to solve security or operational scaling problems.
  • B.S. or M.S. in Computer Science, Information Security, or a related technical field.
  • Demonstrated experience managing environments with 10,000+ workloads and high-availability requirements for retail/commercial applications.
  • Experience with CI/CD and GitOps workflows, treating security configurations as code that is automatically tested and deployed.
  • Expert-level knowledge of security architectures in AWS, Azure, and Google Cloud.
  • Mastery of Terraform, Ansible, or CloudFormation to deploy and manage security configurations at massive scale.
  • Ability to leverage Databricks to perform deep-dive analysis on billions of logs for threat hunting and efficacy reporting.
  • Experience securing Kubernetes (EKS/AKS/GKE) and Docker environments, focusing on runtime protection and image integrity.
  • Proficiency with OAuth 2.0, SAML, and CIAM solutions for large-scale customer and employee authentication.
  • Proficiency in using Python (PySpark/Pandas) within Databricks to build custom anomaly detection models that go beyond standard SIEM correlation rules.
  • Knowledge of the OWASP Top 10 for LLMs and experience implementing AI gateways or "firewalls" to monitor and filter AI-generated traffic.
  • Deep expertise in building "glue code" that connects disparate COTS and custom applications via secure, automated APIs to streamline cross-functional business activities.
  • The ability to explain to non-technical stakeholders how AI-driven security decisions (like blocking a suspicious $1M commercial transaction) are made and how to handle "false positives" at scale.
  • A relentless focus on identifying repetitive manual tasks (e.g., firewall rule reviews, access audits) and replacing them with self-healing, automated systems.

Responsibilities

  • Design and implement automated compliance assessments to enforce hardening standards (CIS, NIST) across cloud accounts and on-premises virtualized environments.
  • Architect and maintain the security of our sprawling asset inventory. Implement data-at-rest and data-in-transit encryption strategies that span from physical data center servers to cloud-native storage.
  • Develop and secure the "Identity Fabric" linking 600k+ employees and millions of commercial customers. Collaborate with Fraud teams to integrate signals from SIEM and Databricks to detect and block malicious account activity.
  • Build and manage secure connectivity (Transit Gateways, Service Mesh) between on-premises hypervisors and multi-cloud environments, ensuring consistent policy enforcement.
  • Partner with the SOC to develop high-fidelity detection logic. Build SOAR playbooks that automate the isolation of compromised cloud workloads or on-premises VMs.
  • Support ongoing "Purple Team" exercises and control testing to validate that security tools (EDR, WAF, DLP) are performing as intended across all tenants.
  • Establish security guardrails for the enterprise’s internal and customer-facing AI models. This includes protecting Databricks training pipelines from data poisoning and implementing mitigations for LLM-specific threats like prompt injection and sensitive data leakage.
  • Drive the transition from manual "click-to-operate" security to Autonomous Security Operations. This involves building advanced SOAR playbooks that use ML-based triggers to perform auto-remediation across hybrid environments without human intervention.
  • Partner with business units to integrate security "invisibly" into their workflows. Use automation to reduce "security friction" in logistics and retail operations, ensuring that compliance checks (like PCI or SOC2) are performed continuously and programmatically.
  • Discover and catalog "Shadow AI" usage across the enterprise, ensuring all third-party AI tools meet the enterprise’s privacy and security standards.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service