Senior Security Engineer – Cloud Defense & Incident Response

S&P Global

Job Summary

We are looking for a Senior Security Engineer with 8–10 years of hands-on experience to be a force multiplier in our Cloud Security and Incident Response program. This deeply technical, individual-contributor role focuses on detection, response, and hardening for our multi-cloud environment (AWS, GCP, Azure). You will drive real-time defense against sophisticated threats targeting our infrastructure and AI workloads, hunt threats, lead incidents, write detection logic, harden cloud configurations with code, and eliminate risks.

Must Have

  • Build, tune, and operationalize high-signal detection content across AWS, GCP, and Azure
  • Lead investigation and response for cloud-native incidents end-to-end
  • Serve as on-call Incident Commander for major security events
  • Perform rapid compromise assessment, memory forensics, cloud artifact collection, and root-cause analysis
  • Own least-privilege IAM policies, guardrails, workload identity federation, and hardened landing-zone standards using Infrastructure-as-Code
  • Proactively hunt across cloud control plane, data plane, and workloads for living-off-the-land techniques, supply-chain compromise, and AI-specific threats
  • Build and maintain security automation to reduce MTTD/MTTR
  • Partner with internal red team and external pentesters to validate detections and drive remediation
  • Mentor engineers on secure cloud patterns and deliver threat briefings
  • 8–10+ years of hands-on experience in cloud security and incident response
  • Expert-level operational experience with at least two of AWS, GCP, or Azure
  • Proven track record leading complex, real-world incident response in cloud environments
  • Strong scripting/programming skills (Python/Go + heavy Terraform or equivalent IaC)
  • Deep knowledge of cloud attack techniques
  • Experience writing and tuning detection rules in Splunk, Elastic, Panther, Datadog Security, or similar

Good to Have

  • Experience responding to AI-specific incidents (training cluster breaches, model exfiltration, poisoned datasets)
  • Contributions to open-source detection content or DFIR tools
  • Prior offensive experience (red team, pen testing) applied to blue-team outcomes
  • Familiarity with MITRE ATT&CK for IaaS/PaaS and the emerging AI Threat Matrix

Perks & Benefits

  • Health & Wellness: Health care coverage designed for the mind and body
  • Flexible Downtime: Generous time off helps keep you energized for your time on
  • Continuous Learning: Access a wealth of resources to grow your career and learn valuable new skills
  • Invest in Your Future: Secure your financial future through competitive pay, retirement planning, a continuing education program with a company-matched student loan contribution, and financial wellness programs
  • Family Friendly Perks: Perks for partners and little ones, with best-in-class benefits for families
  • Beyond the Basics: From retail discounts to referral incentive awards

Job Description

About the Role:

Grade Level (for internal use):

11

We are looking for a Senior Security Engineer with 8–10 years of hands-on experience to be a force multiplier in our Cloud Security and Incident Response program. This is a deeply technical, individual-contributor role reporting to the Associate Director of Security Engineering in a high-velocity, AI-first company.

You will own detection, response, and hardening for our multi-cloud environment (AWS, GCP, Azure) while driving real-time defense against sophisticated threats targeting our infrastructure and AI workloads.

This is a “boots-on-the-ground” role: you’ll hunt threats, lead incidents, write detection logic, harden cloud configurations with code, and eliminate entire classes of risk before attackers can exploit them.

The Impact

  • Be the tip-of-the-spear defender for petabyte-scale AI infrastructure.
  • Directly stop nation-state and financially motivated attackers.
  • Equity in a high-growth AI company.
  • Remote-first, global team with deep trust and autonomy.
  • Work side-by-side with world-class platform engineers and AI researchers.

Key Responsibilities

  • Cloud Threat Detection & Response Build, tune, and operationalize high-signal detection content (Sigma, YARA-L, cloud-native logs, EDR) across AWS, GCP, and Azure. Lead investigation and response for cloud-native incidents end-to-end.
  • Incident Commander & Forensics Serve as on-call Incident Commander for major security events. Perform rapid compromise assessment, memory forensics, cloud artifact collection, and root-cause analysis.
  • Cloud Platform Hardening Own least-privilege IAM policies, guardrails (SCP, Azure Policy, Config rules), workload identity federation, and hardened landing-zone standards using Infrastructure-as-Code (Terraform, Pulumi, Crossplane).
  • Threat Hunting Proactively hunt across cloud control plane, data plane, and workloads for living-off-the-land techniques, supply-chain compromise, and AI-specific threats (model theft, training data exfil).
  • Automation & Tooling Build and maintain security automation (SOAR playbooks, Lambda/SOAR responders, custom detection tooling) to reduce MTTD/MTTR.
  • Red Team Collaboration Partner with internal red team and external pentesters to validate detections and drive remediation of systemic cloud risks.
  • Security Champions & Enablement Mentor engineers on secure cloud patterns and deliver “lunch-and-learn” threat briefings tied to real incidents.

Required Qualifications

  • 8–10+ years of hands-on experience in cloud security and incident response.
  • Expert-level operational experience with at least two of AWS, GCP, or Azure (the third is a strong plus).
  • Proven track record leading complex, real-world incident response in cloud environments (ransomware, APT, credential abuse, etc.).
  • Strong scripting/programming skills (Python/Go + heavy Terraform or equivalent IaC).
  • Deep knowledge of cloud attack techniques: IAM privilege escalation, container escapes, SSRF to metadata, living-off-the-cloud, etc.
  • Experience writing and tuning detection rules in Splunk, Elastic, Panther, Datadog Security, or similar.
  • Relevant certifications (preferred): GCIH, GCFA, GNFA, AWS Certified Security – Specialty, Azure Security Engineer, Google Professional Cloud Security Engineer, CCSP.

Preferred Skills

  • Experience responding to AI-specific incidents (training cluster breaches, model exfiltration, poisoned datasets).
  • Contributions to open-source detection content or DFIR tools.
  • Prior offensive experience (red team, pen testing) applied to blue-team outcomes.
  • Familiarity with MITRE ATT&CK for IaaS/PaaS and the emerging AI Threat Matrix.

Who You Are

  • Hunter mindset: You treat “quiet” as suspicious and go looking for evil.
  • Ownership obsessed: You close incidents with permanent fixes, not just tickets.
  • Calm under fire: You’ve led war rooms at 3 a.m. and kept everyone focused.
  • Cloud-native: You think in resources, policies, and API calls—not checkboxes.
  • Communicator: You turn forensic findings into clear, actionable stories for engineers and leadership.

If you live for the moment an alert fires, love chasing attackers through cloud logs, and want to defend the infrastructure powering tomorrow’s AI—this is your role.

What’s In It For You?

Our Mission:

Advancing Essential Intelligence.

Our People:

We're more than 35,000 strong worldwide—so we're able to understand nuances while having a broad perspective. Our team is driven by curiosity and a shared belief that Essential Intelligence can help build a more prosperous future for us all.From finding new ways to measure sustainability to analyzing energy transition across the supply chain to building workflow solutions that make it easy to tap into insight and apply it. We are changing the way people see things and empowering them to make an impact on the world we live in. We’re committed to a more equitable future and to helping our customers find new, sustainable ways of doing business. Join us and help create the critical insights that truly make a difference.

Our Values:

Integrity, Discovery, Partnership

Throughout our history, the world's leading organizations have relied on us for the Essential Intelligence they need to make confident decisions about the road ahead. We start with a foundation of integrity in all we do, bring a spirit of discovery to our work, and collaborate in close partnership with each other and our customers to achieve shared goals.

Benefits:

We take care of you, so you can take care of business. We care about our people. That’s why we provide everything you—and your career—need to thrive at S&P Global.

Our benefits include:

  • Health & Wellness: Health care coverage designed for the mind and body.
  • Flexible Downtime: Generous time off helps keep you energized for your time on.
  • Continuous Learning: Access a wealth of resources to grow your career and learn valuable new skills.
  • Invest in Your Future: Secure your financial future through competitive pay, retirement planning, a continuing education program with a company-matched student loan contribution, and financial wellness programs.
  • Family Friendly Perks: It’s not just about you. S&P Global has perks for your partners and little ones, too, with some best-in class benefits for families.
  • Beyond the Basics: From retail discounts to referral incentive awards—small perks can make a big difference.

For more information on benefits by country visit: https://spgbenefits.com/benefit-summaries

Global Hiring and Opportunity at S&P Global:

At S&P Global, we are committed to fostering a connected and engaged workplace where all individuals have access to opportunities based on their skills, experience, and contributions. Our hiring practices emphasize fairness, transparency, and merit, ensuring that we attract and retain top talent. By valuing different perspectives and promoting a culture of respect and collaboration, we drive innovation and power global markets.

Recruitment Fraud Alert:

If you receive an email from a spglobalind.com domain or any other regionally based domains, it is a scam and should be reported to reportfraud@spglobal.com. S&P Global never requires any candidate to pay money for job applications, interviews, offer letters, “pre-employment training” or for equipment/delivery of equipment. Stay informed and protect yourself from recruitment fraud by reviewing our guidelines, fraudulent domains, and how to report suspicious activity here.

-----------------------------------------------------------

Equal Opportunity Employer

S&P Global is an equal opportunity employer and all qualified candidates will receive consideration for employment without regard to race/ethnicity, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, marital status, military veteran status, unemployment status, or any other status protected by law. Only electronic job submissions will be considered for employment.

If you need an accommodation during the application process due to a disability, please send an email to: EEO.Compliance@spglobal.com and your request will be forwarded to the appropriate person.

US Candidates Only: The EEO is the Law Poster http://www.dol.gov/ofccp/regs/compliance/posters/pdf/eeopost.pdf describes discrimination protections under federal law. Pay Transparency Nondiscrimination Provision - https://www.dol.gov/sites/dolgov/files/ofccp/pdf/pay-transp%20EnglishformattedESQA508c.pdf

-----------------------------------------------------------

20 - Professional (EEO-2 Job Categories-United States of America), IFTECH202.2 - Middle Professional Tier II (EEO Job Group)

Job ID: 323194

Posted On: 2025-12-04

Location: Noida, Uttar Pradesh, India

12 Skills Required For This Role

Team Management Oops Talent Acquisition Game Texts Incident Response Aws Identity Federation Azure Terraform Cloud Security Python Splunk

Similar Jobs