Security Engineer safeguarding AWS environments for Genesys Cloud mission. Handling advanced threats and collaborating with SecDev, PenTest, DevOps, and SRE teams.
Responsibilities
Protecting the trust our customers place in Genesys Cloud requires constant vigilance, technical depth, and proactive defense
Safeguard a global SaaS platform by identifying advanced threats, strengthening identity controls, and driving resilient cloud security architecture
Conduct proactive threat hunting across AWS environments using SIEM, EDR, and cloud-native telemetry to identify and disrupt sophisticated threat activity
Investigate AWS GuardDuty findings and lead root cause analysis of security events, translating threat actor tactics, techniques, and procedures into actionable containment strategies
Develop and maintain threat intelligence feeds and indicators of compromise to strengthen detection capabilities and reduce dwell time
Execute quarterly vulnerability assessments and network segmentation scans, driving remediation to measurable risk reduction outcomes
Identify cloud misconfigurations and implement structured ticketing workflows to ensure timely and traceable remediation
Audit AWS IAM policies, service roles, and trust relationships to enforce least privilege and reduce identity-based attack surfaces
Utilize Identity Security Posture Management practices to detect over-privileged accounts, dormant identities, and authentication misconfigurations
Enhance detection tooling configurations across EDR and SIEM platforms to improve signal quality and operational efficiency
Monitor cloud security services for regression or control gaps and implement persistent validation mechanisms
Support incident containment, eradication, and recovery efforts using IAM-centric response methods such as credential rotation and session revocation
Collaborate with SecDev, PenTest, DevOps, and SRE teams to embed automation and strengthen secure-by-design practices
Requirements
Demonstrate mid-level experience securing AWS cloud environments within a SaaS or enterprise setting
Apply strong knowledge of Linux systems administration and foundational security principles including OWASP Top 10
Utilize EDR platforms such as CrowdStrike, SentinelOne, or Rapid7 and cloud SIEM technologies such as Splunk, Datadog, or Sumo Logic
Analyze threat actor behavior and perform structured root cause analysis to drive lasting remediation
Operate independently while managing security initiatives with minimal oversight
Communicate technical findings clearly to both technical and non-technical stakeholders
Work effectively within regulated environments and adhere to defined architectural and security standards
Benefits
Comprehensive extended group health coverage
Generous paid time off, including vacation and personal leave
Retirement savings program with employer RRSP matching up to a prescribed maximum amount
Family-friendly benefits, including parental leave top-up and adoption assistance
Growth and development opportunities through access to learning resources and internal mobility programs
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.