About the job
Assurity Trusted Solutions (ATS), a proud subsidiary of the Government Technology Agency (GovTech), has established itself as a reliable partner over the last decade. ATS provides an extensive range of products and services, encompassing infrastructure and operational services, governance and assurance services, as well as managed processes. In today’s dynamic digital and cyber landscape, where trust and collaboration are paramount, ATS is committed to fostering mutually beneficial outcomes through partnerships with GovTech, governmental agencies, and commercial stakeholders to effectively mitigate cyber risks and enhance security frameworks.
Key Responsibilities:
Cloud Security Engineering Collaboration
- Act as a dedicated cloud security engineer integrated within product teams for systems managed by the CIOO, while contributing from a central security function that supports multiple product teams.
- Conduct thorough reviews of cloud solutions and infrastructure designs, offering clear and actionable security guidance across various areas, including:
- Account and landing zone configurations,
- VPC and network segmentation,
- Identity and Access Management (IAM),
- Data protection, logging, monitoring, and workload security.
- Design and recommend security controls that are tailored to the needs of each product, ensuring a balance between protection, usability, and delivery speed.
- Collaborate closely with product and platform teams to integrate security-by-design principles into architectures, CI/CD pipelines, and daily engineering practices.
- Enhance the security posture of existing systems by:
- Identifying control gaps through automated checks and design reviews,
- Prioritizing remediation efforts,
- Assisting teams with sustainable implementation of improvements.
Centralized Cloud Security Capabilities
- Contribute to the design and implementation of centralized cloud security capabilities for systems under the CISO’s oversight, including patterns and reference implementations for:
- Bring Your Own Keys (BYOK) and Enterprise Key Vaults management patterns for product team workloads,
- Cloud Privileged Access Management (PAM), covering role design, just-in-time access patterns, and approval workflows.
- Provide hands-on configuration for AWS security services like KMS, certificate management, and IAM to implement these patterns in live environments.
- Collaborate with infrastructure/platform teams to define how logs and security telemetry from AWS workloads are collected, normalized, and integrated into centralized tools (e.g., security analytics or observability platforms).
Control Validation and Automation
- Establish and execute automated checks to ensure compliance and security control effectiveness.

