Contract
Posted on 30 June 25 by Reginald Dykes
Powered by Tracker
Job Title: Information Security Engineer
Location: Charlotte, NC
Employment Type: Contract (U.S.-Based)
Labor Category: IT
We are seeking a skilled Information Security Engineer to join our cybersecurity team on a contract basis. The ideal candidate will bring hands-on experience in infrastructure automation, cloud security, and scripting, with a strong foundation in securing cloud environments and applying Information Security Engineering principles.
This position plays a key role in designing, implementing, and maintaining secure infrastructure across cloud platforms while supporting automation and security best practices.
Design and implement secure infrastructure solutions using Infrastructure as Code (Terraform).
Apply GitOps principles to manage infrastructure and application configurations via Git.
Support and review CI/CD pipelines using Jenkins, including troubleshooting build errors and logs.
Automate and script security configurations and tasks using Python or similar scripting languages.
Collaborate with cloud engineering teams to apply least privilege principles, manage IAM roles, and enforce cloud security best practices.
Work across cloud platforms (AWS, GCP, or Azure) to ensure secure design and deployment of cloud-native services.
Participate in security reviews and contribute to securing the full infrastructure lifecycle.
Maintain documentation and ensure compliance with internal security and audit requirements.
4+ years of experience in Information Security Engineering, or equivalent experience through consulting, training, military service, or education.
Hands-on experience with Terraform and Infrastructure as Code (IaC) automation.
Familiarity with at least one major cloud SDK/platform (AWS, GCP, or Azure).
Knowledge of GitOps and using Git for infrastructure and configuration management.
Understanding of CI/CD pipelines and tools like Jenkins.
Proficiency in scripting, preferably with Python.
Solid understanding of cloud security concepts, IAM, and least privilege access models.