Role Summary:
The Cloud Security & Architecture Analyst will be responsible for
designing, documenting, and maintaining architecture blueprints that
support secure, scalable, and well-governed cloud solutions. This role
requires strong conceptual knowledge of cloud ecosystems—primarily
AWS—and the ability to translate technical components into clear data
flows, integrations, and detection logic. The ideal candidate brings
deep understanding of SIEM platforms, log streaming patterns, and modern
detection capabilities to ensure enterprise-grade security visibility.
Responsibilities:
• Develop end-to-end Data Flow Diagrams (DFDs) illustrating system interactions, data movement, integrations, and control points. • Create and maintain reference architecture blueprints mapping solution components, platforms, services, and integrations. • Collaborate with Cloud, Security, and Engineering teams to validate architecture decisions and ensure alignment with enterprise standards. • Document how each component fits within the broader technology stack, ensuring clarity in dependencies and operational flows. • Support design and optimization of log pipelines, telemetry flows, and SIEM ingestion patterns.
• Maintain documentation and support knowledge transfer across
engineering, security operations, and architecture teams.
Requirements:
• Strong conceptual understanding of AWS cloud services, cloud
networking, IAM, compute, storage, logging, and security patterns.
• Experience developing clear, detailed Data Flow Diagrams (DFDs) for
distributed architectures.
• Deep understanding of SIEM platforms, log ingestion pipelines, stream
processing, parsers, enrichment logic, and detection rule behavior.
• Ability to map all technical components into cohesive blueprint
architecture documents used by engineering and security teams.
• Strong analytical thinking and structured documentation skills.
• Excellent communication and cross-functional collaboration abilities.
Nice-to-Have:
• Familiarity with cloud security principles (IAM, encryption, network
segmentation).
• Familiarity with MITRE ATT&CK framework • Exposure to SOAR, EDR, or threat detection workflows. • Experience with modeling tools like Lucidchart, Draw.io, or Visio. • Knowledge of cloud logging tools such as AWS CloudTrail, CloudWatch, VPC Flow Logs, or event routing systems.
—
Thanks
Piyush Verma
Technical Recruiter | Empower Professionals
Piyush@empowerprofessionals.com
—