Job Title: Information Security Engineer
Location: Charlotte, NC
Employment Type: Contract (U.S.-Based)
Labor Category: IT
Job Summary:
We are seeking a skilled Information Security Engineer to join our cybersecurity team on a contract basis. The ideal candidate will bring hands-on experience in infrastructure automation, cloud security, and scripting, with a strong foundation in securing cloud environments and applying Information Security Engineering principles.
This position plays a key role in designing, implementing, and maintaining secure infrastructure across cloud platforms while supporting automation and security best practices.
Key Responsibilities:
-
Design and implement secure infrastructure solutions using Infrastructure as Code (Terraform).
-
Apply GitOps principles to manage infrastructure and application configurations via Git.
-
Support and review CI/CD pipelines using Jenkins, including troubleshooting build errors and logs.
-
Automate and script security configurations and tasks using Python or similar scripting languages.
-
Collaborate with cloud engineering teams to apply least privilege principles, manage IAM roles, and enforce cloud security best practices.
-
Work across cloud platforms (AWS, GCP, or Azure) to ensure secure design and deployment of cloud-native services.
-
Participate in security reviews and contribute to securing the full infrastructure lifecycle.
-
Maintain documentation and ensure compliance with internal security and audit requirements.
Required Qualifications:
-
4+ years of experience in Information Security Engineering, or equivalent experience through consulting, training, military service, or education.
-
Hands-on experience with Terraform and Infrastructure as Code (IaC) automation.
-
Familiarity with at least one major cloud SDK/platform (AWS, GCP, or Azure).
-
Knowledge of GitOps and using Git for infrastructure and configuration management.
-
Understanding of CI/CD pipelines and tools like Jenkins.
-
Proficiency in scripting, preferably with Python.
-
Solid understanding of cloud security concepts, IAM, and least privilege access models.