Seagate Technology

Cloud Security Architect

United Kingdom

2 months ago
Save Job

Summary

About Our Group

Are you passionate about cybersecurity and cloud computing? We are seeking a dedicated Security Engineer to join our team and protect our cloud data centers.

LYVE is an edge-to-cloud mass storage platform from Seagate – built for the distributed enterprise to capture the unstructured data explosion. Cloud Storage-as-a-Service platform is an S3-compatible storage-only cloud that enables always-on mass capacity data storage and activation. It is designed as a simple, trusted, and efficient service allowing enterprises to unlock the value of their massive unstructured datasets. LYVE is a natural extension of Seagate’s leadership in mass data solutions, combining our mass capacity HDD innovation with deep storage industry knowledge to help customers activate more of their valuable data.

About The Role - You Will

This position is a critical role inside the LYVE Cloud Information Security team. Information Security is a strategic imperative for LYVE Cloud and ensuring the availability, integrity and confidentiality of customer, business partner, employee and business information in compliance with the organization's information security policies is critical to our mission.

Work closely with your colleagues in the Information Security organization and stakeholders across the LYVE Cloud function to ensure appropriate architectual objectives are in place and that security policies are effectively implemented.

Participate in all aspects of Security Operations Architecture to identify, protect, detect and respond to Cyber threats with the objective of avoiding business disruption, breach of customer information and reputational damage to Seagate.

Key Responsibilities

  • Architect and Implement Security-as-Code: Embed security controls directly into CI/CD pipelines and infrastructure-as-code (IaC) tools such as Terraform, CloudFormation, or Pulumi.
  • Security Automation & Tooling: Lead the development of automation tools for vulnerability scanning, static/dynamic code analysis, container security, and policy enforcement.
  • Threat Modeling & Risk Management: Conduct advanced threat modeling and provide risk assessments for infrastructure, applications, and cloud platforms.
  • Incident Response Engineering: Build and enhance security monitoring, alerting, and response capabilities across cloud-native and hybrid environments.
  • Cross-Functional Collaboration: Act as the security SME (subject matter expert) working closely with engineering, DevOps, product, and compliance teams to ensure security is baked in from design to production.
  • Mentorship & Leadership: Provide mentorship to junior engineers and help shape security culture and practices across teams.
  • Compliance & Governance: Ensure alignment with security best practices and regulatory requirements (e.g., SOC 2, HIPAA, ISO 27001, FedRAMP).

About You

  • You are humble and empathetic and recognize the worth of Seagate’s values of Inclusion, Innovation and Integrity
  • You have a strong work ethic and are outcomes-focused
  • You believe in life-long learning in this dynamic and fast-moving field
  • You are self-driven and change energizes you
  • You strive for excellence
  • You recognize that our colleagues and our relationships are the most valuable assets we have

Your Experience Includes

  • 8+ years in security engineering, DevOps, or cloud infrastructure roles, with 3+ years in a SecDevOps or DevSecOps capacity.

Deep Expertise In

  • CI/CD platforms (e.g., GitHub Actions, GitLab, Jenkins, CircleCI)
  • IaC tools (e.g., Terraform, CloudFormation)
  • Container and orchestration platforms (e.g., Docker, Kubernetes)
  • Security tools (e.g., Snyk, Checkov, Aqua, Twistlock, Trivy)
  • Proficiency in at least one programming/scripting language (Python, Go, Bash, etc.).
  • Strong understanding of security frameworks and best practices (e.g., NIST, CIS Benchmarks, MITRE ATT&CK).
  • Experience implementing scalable logging, monitoring, and incident response in distributed systems.
  • Excellent communication and presentation capabilities combined with ability to clearly articulate complex information security proposals and to influence stakeholders at all levels up to and including executive management
  • Clear understanding of security processes and technologies including: Access control, Incident response, Threat Hunting, Vulnerability Assessment, Security Monitoring and Compliance
  • Being well-versed in digital forensics, malware analysis, operating systems, encryption schemas & algorithms, IAM, authorization and authentication mechanisms and PKI
  • Strong knowledge of Cyberattack Kill Chain, Cybersecurity Defense, Attack Monitoring (SIEM / Elk stacks) including documentation and ticketing fundamentals and security technology architectures
  • Desirable certifications such as CISSP or CGIH, CGFE, CGFA

Location:

Remote - UK/London

Travel - 10%

Location: Remote United Kingdom, Amsterdam, Netherlands, Dubai United Arab Emirates, Dublin, Ireland, Marlow United Kingdom, Remote Belgium, Remote Germany, Remote Italy, Remote Northern Ireland, Remote Scotland

Travel: Up to 10%

How strong is your resume?

Upload your resume and get feedback from our expert to help land this job

People also searched: