Cleo logo

Cloud Security Lead

Verified
Cleo
Posted 1 months ago
Posted 17 March 2026
2 views
full-time

About the Role

<p>Cleo is seeking a Lead Cloud Security Engineer to design, implement, and continuously improve security controls across our cloud infrastructure and SaaS environments.<span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></p> <p><span data-contrast="auto">This role&nbsp;is responsible for&nbsp;strengthening Cleo’s AWS security posture, embedding secure-by-default cloud guardrails, and partnering closely with Platform and Engineering teams to reduce infrastructure risk without slowing innovation.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></p> <p><span data-contrast="auto">The ideal candidate is hands-on, technically deep in AWS, and experienced in building scalable cloud security capabilities in a high-growth SaaS environment.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></p> <p><strong>&nbsp;</strong></p> <h3><strong>What You Will Be Doing</strong></h3> <p><strong>Cloud Security Architecture</strong><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> Design and implement secure cloud architecture patterns</span></li> <li><span data-contrast="auto"> Establish guardrails for AWS accounts and services</span></li> <li><span data-contrast="auto"> Strengthen multi-account strategy and segmentation</span></li> <li><span data-contrast="auto"> Improve IAM design, permission boundaries, and least-privilege models</span></li> <li><span data-contrast="auto"> Review major infrastructure changes for security impact</span></li> </ul> <p><span data-contrast="none"><span data-ccp-parastyle="heading 3"><strong>Cloud Detection and Visibility</strong></span></span><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> Implement and tune cloud-native detection capabilities</span></li> <li><span data-contrast="auto"> Integrate AWS security services into centralized monitoring</span></li> <li><span data-contrast="auto"> Identify misconfigurations and excessive permissions</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto"> Improve signal-to-noise ratio in cloud alerts</span></li> </ul> <p><span data-contrast="none"><span data-ccp-parastyle="heading 3"><strong>Infrastructure as Code Security</strong></span></span><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto">&nbsp;Embed security controls into Terraform or other IaC workflows</span><span data-ccp-props="{&quot;335559738&quot;:240}">&nbsp;</span></li> <li><span data-contrast="auto"> Enforce policy-as-code guardrails</span></li> <li><span data-contrast="auto"> Ensure IaC scanning is integrated into CI/CD pipelines</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto"> Reduce configuration drift across environments</span></li> </ul> <p><span data-contrast="none"><span data-ccp-parastyle="heading 3"><strong>Vulnerability and Configuration Management</strong></span></span><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> Oversee cloud misconfiguration detection and remediation</span></li> <li><span data-contrast="auto"> Track infrastructure vulnerability exposure</span></li> <li><span data-contrast="auto"> Reduce critical vulnerability exposure window</span></li> <li><span data-contrast="auto"> Partner with Platform teams to automate remediation</span></li> </ul> <p><span data-contrast="none"><span data-ccp-parastyle="heading 3"><strong>Data Protection and Encryption</strong></span></span><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> Ensure proper encryption standards across storage and databases</span></li> <li><span data-contrast="auto"> Manage KMS usage and key lifecycle best practices</span></li> <li><span data-contrast="auto"> Strengthen logging and monitoring coverage</span></li> </ul> <p><span data-contrast="none"><span data-ccp-parastyle="heading 3"><strong>Incident Response Support</strong></span></span><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> Lead cloud-focused investigations during security incidents</span></li> <li><span data-contrast="auto"> Improve forensic readiness in AWS</span></li> <li><span data-contrast="auto"> Harden logging and evidence retention practices</span></li> </ul> <p><span data-contrast="none"><span data-ccp-parastyle="heading 3"><strong>Automation and Continuous Improvement</strong></span></span><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> Automate guardrails and enforcement mechanisms</span></li> <li><span data-contrast="auto"> Improve developer experience with secure cloud defaults</span></li> <li><span data-contrast="auto"> Reduce manual cloud security reviews</span></li> <li><span data-contrast="auto"> Optimizing tooling cost and effectiveness</span><span data-ccp-props="{&quot;335559739&quot;:240}">&nbsp;</span></li> </ul> <p><span data-contrast="none"><span data-ccp-parastyle="heading 3"><strong>Metrics and Reporting</strong></span></span><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> Define KPIs for cloud security posture</span></li> <li><span data-contrast="auto"> Report on misconfiguration trends and exposure windows</span></li> <li><span data-contrast="auto"> Provide executive-level reporting on infrastructure risk</span></li> <li><span data-contrast="auto"> Support audit and compliance evidence collection</span></li> </ul> <p>&nbsp;</p> <h3><strong>Your Qualifications</strong></h3> <p>&nbsp;<strong>Required</strong><span data-ccp-props="{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:280,&quot;335559739&quot;:80}">&nbsp;</span></p> <ul> <li><span data-contrast="auto"> 7+ years of experience in cloud security, cloud engineering, or infrastructure security</span></li> <li><span data-contrast="auto"> Deep expertise in AWS architecture and services</span><span data-ccp-props="{}">&nbsp;</span></li> <li><span data-contrast="auto"> Strong understanding of IAM design and least-privilege principles</span></li> <li><span data-contrast="auto"> Experience with Infrastructure as Code and CI/CD integration</span></li> <li><span data-contrast="auto"> Experience implementing

Related Searches

Explore more opportunities matching this role's title, location, and skills.

Job Title PagesLocation PagesCompany PagesSkill Pages

Ready to apply?

Click below to apply directly on Cleo's careers page.

Get the top 10 hyper-growth roles delivered to your inbox every Tuesday.