▷ Immediate Start! Security Engineer, AWS ManagedServices

Amazon
London
2 days ago
Create job alert

AMS Security provides 24/7 threat monitoring,investigation, and response across customer’s AWS environments. AMSenhances existing security capabilities by supporting securitymonitoring for all native AWS services and supports vendor-agnosticdetective and protective controls to provide holistic securitycontrols for customers. This is done by leveraging data on commonattack techniques to enhance detective controls and incidentresponse, then building auto-remediation capabilities to minimizedisruption to customer workloads. When a security event doeshappen, you will be there to provide guidance. AWS Managed Services(AMS) Security is looking for technical Security Engineers that arepassionate about learning new concepts and work well within a teamenvironment to keep customers secure. We value engineers that canwork through ambiguity to identify suspicious activity, leadsecurity response, and can explain technical security concepts tonon-technical audiences. Key job responsibilities 1. Identify,evaluate and communicate security threats, risks andvulnerabilities, and propose recommended remediation for securityissues. 2. Contribute to the development of security automation andsecurity posture improvements. 3. Track and report on theeffectiveness of AWS detective controls such as Amazon GuardDuty,Amazon Macie, and other new security products. 4. Develop processesand policies to increase security response effectiveness. 5.On-call support: This role requires periodic on-callresponsibilities including weekends. A day in the life As aSecurity Engineer in AWS Managed Services (AMS), yourresponsibilities include monitoring networks and systems forpotential threats, performing triage for security alerts,documenting suspicious activity, and reporting issues so they canbe adequately handled. You will work alongside our securityengineers and partner teams to perform daily threat detection andincident response, using the full capability of AWS technologiesand services to detect and mitigate cyber threats at a massivescale and help protect AWS Customers. You should also enjoylearning about the most up-to-date new technologies and proceduresto protect information systems and data. About the team DiverseExperiences AWS values diverse experiences. Even if you do not meetall of the preferred qualifications and skills listed in the jobdescription, we encourage candidates to apply. If your career isjust starting, hasn’t followed a traditional path, or includesalternative experiences, don’t let it stop you from applying. WhyAWS? Amazon Web Services (AWS) is the world’s most comprehensiveand broadly adopted cloud platform. We pioneered cloud computingand never stopped innovating — that’s why customers from the mostsuccessful startups to Global 500 companies trust our robust suiteof products and services to power their businesses. Inclusive TeamCulture Here at AWS, it’s in our nature to learn and be curious.Our employee-led affinity groups foster a culture of inclusion thatempower us to be proud of our differences. Ongoing events andlearning experiences, including our Conversations on Race andEthnicity (CORE) and AmazeCon (gender diversity) conferences,inspire us to never stop embracing our uniqueness. Mentorship &Career Growth We’re continuously raising our performance bar as westrive to become Earth’s Best Employer. That’s why you’ll findendless knowledge-sharing, mentorship and other career-advancingresources here to help you develop into a better-roundedprofessional. Work/Life Balance We value work-life harmony.Achieving success at work should never come at the expense ofsacrifices at home, which is why we strive for flexibility as partof our working culture. When we feel supported in the workplace andat home, there’s nothing we can’t achieve in the cloud. MinimumRequirements 1. Minimum of 2 years or more of demonstratedexperience in a technical field with a focus in areas such asoperating systems, network, and/or applications. 2. Understandingof security concepts and common security threats in host operatingsystems (Linux/ Windows), log analysis and investigation. 3.Knowledge of networking protocols such as HTTP, DNS and TCP/IP. 4.Experience with programming languages such as Python. 5. Knowledgeof common system security vulnerabilities and remediationtechniques. 6. Understanding of the tools, tactics, and techniquesused by threat actors during security events. 7.Familiarity/experience with AWS services and security concepts.Acknowledgement of country: In the spirit of reconciliation, Amazonacknowledges the Traditional Custodians of country throughoutAustralia and their connections to land, sea and community. We payour respect to their elders past and present and extend thatrespect to all Aboriginal and Torres Strait Islander peoples today.IDE statement: Amazon is committed to a diverse and inclusiveworkplace. Amazon is an equal opportunity employer and does notdiscriminate on the basis of race, national origin, gender, genderidentity, sexual orientation, disability, age, or other legallyprotected attributes. Our inclusive culture empowers Amazonians todeliver the best results for our customers. If you have adisability and need a workplace accommodation or adjustment duringthe application and hiring process, including support for theinterview or onboarding process, please visit here for moreinformation. If the country/region you’re applying in isn’t listed,please contact your Recruiting Partner.#J-18808-Ljbffr

Related Jobs

View all jobs

▷ [3 Days Left] Senior Cyber Security Architect - HealthSector

▷ 15h Left! Information Security Engineer

▷ [15h Left] Network and Security Engineer - Engage inhybrid working flexibility (Previous Relevant Experince...

▷ Apply Now! Security Engineer | Splunk | SIEM

▷ (Apply in 3 Minutes) Senior Cybersecurity Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.

Cyber Security Jobs in the Public Sector: Protecting the UK’s Digital Future

Cyber threats have grown exponentially in recent years, targeting both private businesses and government institutions. As technology becomes ever more embedded in daily life—managing everything from national security to healthcare records—the risk of cyber attacks also increases. In the UK public sector, where vital services and sensitive citizen data are at stake, cyber security has become a top priority. For professionals looking for a meaningful career at the intersection of technology, national security, and public service, cyber security jobs in the UK public sector present an exciting and fulfilling path. In this blog post, we’ll delve into why cyber security is so critical to government agencies, the most in-demand roles, the skills and qualifications required, and how to navigate the application process. By the end, you’ll have a clearer sense of how you can leverage your technical expertise to protect the nation’s digital infrastructure.