At a Glance
- Tasks: Lead the remediation of cloud vulnerabilities in AWS and collaborate with developers.
- Company: Join a forward-thinking tech company focused on cloud security.
- Benefits: Competitive pay, flexible working options, and opportunities for skill development.
- Why this job: Make a real impact by enhancing cloud security and protecting vital data.
- Qualifications: Experience in AWS security and strong understanding of DevSecOps practices.
- Other info: Dynamic role with potential for growth in a collaborative environment.
The predicted salary is between 45000 - 63000 £ per year.
AWS Security & Vulnerability Remediation Engineer (DevSecOps / Cloud Security) 3 month initial contract outside IR35
Overview: We are looking to hire an AWS-focused security engineer to lead the remediation of cloud and application vulnerabilities across our AWS environment. You will work closely with Developers, Data Engineers, and our AWS Security Lead to validate findings, prioritise risk, implement fixes, and strengthen security controls. AWS security is your primary technical skill; a strong understanding of software development, DevSecOps practices, and vulnerability management is essential.
Key Responsibilities:
- Own end-to-end remediation of AWS and workload vulnerabilities: confirm findings, assess impact, prioritise actions, and track through to closure.
- Partner with Developers and Data Engineers to implement secure fixes in code, infrastructure, and delivery pipelines (IaC, containers, serverless, OS/packages).
- Work with the AWS Security Lead to ensure remediation aligns with AWS security controls, internal risk policies, and compliance requirements.
- Improve and automate vulnerability management processes (e.g., scanning coverage, SLAs, exception handling, evidence capture).
- Embed security into CI/CD and the SDLC: shift-left reviews, secure coding guidance, dependency management, and pipeline guardrails.
- Configure, tune, and operate AWS security services (e.g., GuardDuty, Security Hub, Inspector, Config, IAM Access Analyzer) to reduce exposure and prevent repeat issues.
- Produce clear remediation guidance, runbooks, and reporting dashboards for both technical and non-technical stakeholders.
- Support incident response and post-remediation validation where high-risk findings are exploited or trending.
AWS / Cloud Security (Primary):
- Deep, hands-on AWS security experience across IAM, networking, compute, storage, serverless, and managed data services.
- Strong knowledge of the AWS Well-Architected Security Pillar and common control frameworks (CIS AWS Foundations, NIST/ISO-aligned controls).
- Demonstrable experience implementing and validating AWS security controls, including:
- IAM least privilege, roles, permission boundaries, SCPs, and access reviews
- VPC segmentation, security group/NACL design, private endpoints, WAF/Shield
- Encryption in transit and at rest using KMS, TLS, and secrets management
- Logging and monitoring: CloudTrail, CloudWatch, Config, centralised SIEM patterns
- Threat detection and posture management using AWS native services
Dev / DevSecOps / Vulnerability Management (Primary):
- Strong understanding of modern SDLC, CI/CD, and DevSecOps approaches.
- Proven experience managing the full vulnerability lifecycle: triage, prioritisation (CVSS/EPSS/KEV), remediation, verification, and reporting.
- Comfortable remediating a wide range of findings: OS/package CVEs, container images, third-party libraries, serverless runtimes, and cloud misconfigurations.
- Able to translate security findings into clear, practical tasks for engineering teams and coach on secure implementation.
Engineering & Tooling:
- Infrastructure as Code: Terraform and/or CloudFormation; able to review and fix security weaknesses in IaC.
- Scripting/automation skills in Python, Bash, or similar to streamline remediation and control validation.
- Familiarity with container and serverless security (ECR, ECS/EKS, Lambda, image scanning, runtime hardening).
- Experience with common vulnerability and scanning tools (e.g., AWS Inspector/Security Hub, Snyk, Trivy, Dependabot, Prisma/Qualys/Tenable, etc.).
Nice to Have:
- Security certifications such as AWS Security Specialty, AWS Solutions Architect, or equivalent.
- Experience supporting data platforms on AWS (Glue, EMR, Redshift, Athena, RDS, OpenSearch, Kafka/MSK).
- Knowledge of secure coding practices in Python/Node/Java or your core development stack.
- Experience with policy-as-code and automated control enforcement (OPA/Conftest, tfsec, Checkov).
Personal Attributes:
- Highly collaborative and pragmatic; you enjoy working directly with engineers to ship secure fixes quickly.
- Strong risk judgement and the ability to balance urgency with operational impact.
- Clear communicator who can write concise remediation guidance and present progress to stakeholders.
- Ownership mindset: you drive remediation through to completion, not just identification.
AWS Security Engineer Contract employer: With Intelligence
Contact Detail:
With Intelligence Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land AWS Security Engineer Contract
✨Tip Number 1
Network like a pro! Attend industry meetups, webinars, or online forums related to AWS security. Engaging with others in the field can lead to job opportunities that aren't even advertised yet.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your AWS security projects or contributions to open-source tools. This gives potential employers a tangible sense of what you can bring to the table.
✨Tip Number 3
Prepare for interviews by brushing up on common AWS security scenarios and challenges. Practise explaining how you've tackled similar issues in the past, as this will demonstrate your hands-on experience.
✨Tip Number 4
Don't forget to apply through our website! We often have exclusive listings that might not be found elsewhere. Plus, it shows you're genuinely interested in joining our team.
We think you need these skills to ace AWS Security Engineer Contract
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter to highlight your AWS security experience. We want to see how your skills align with the job description, so don’t hold back on showcasing your relevant projects and achievements!
Show Off Your Technical Skills: Since this role is all about AWS security, be sure to emphasise your hands-on experience with AWS services and security controls. Mention specific tools and practices you’ve used in your previous roles to demonstrate your expertise.
Be Clear and Concise: When writing your application, keep it straightforward and to the point. We appreciate clarity, so avoid jargon and make sure your key points stand out. This will help us quickly see why you’re a great fit for the role!
Apply Through Our Website: We encourage you to submit your application through our website. It’s the best way for us to receive your details and ensures you’re considered for the position. Plus, it’s super easy to do!
How to prepare for a job interview at With Intelligence
✨Know Your AWS Security Inside Out
Make sure you brush up on your AWS security knowledge, especially around IAM, VPCs, and the Well-Architected Security Pillar. Be ready to discuss specific AWS services like GuardDuty and Inspector, and how you've used them in past projects.
✨Showcase Your DevSecOps Experience
Prepare examples of how you've integrated security into the software development lifecycle. Talk about your experience with CI/CD pipelines and how you've implemented secure coding practices or automated vulnerability management processes.
✨Communicate Clearly and Concisely
Practice explaining complex security concepts in simple terms. You'll need to demonstrate that you can translate technical findings into actionable tasks for developers, so think about how you would present remediation guidance to both technical and non-technical stakeholders.
✨Demonstrate Your Problem-Solving Skills
Be ready to discuss how you've tackled vulnerabilities in the past. Share specific examples of how you prioritised risks, implemented fixes, and tracked issues through to closure. Highlight your ownership mindset and how you drive remediation efforts.