Sr IT Engineer Cloud Security
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Cloud Computing
Overview
Live the experience. From professional empowerment to continual learning opportunities. From ongoing investment in new and emerging technologies to a career of self‑determination. At Ulta Beauty, our tech team is critical to our scalability—and is recognized that way. We’ve been defined as a “mature start‑up.” A place where interdepartmental exposure, open doors, and genuine collaboration is ubiquitous. Where challenges come fast and furious, requiring agility, mental dexterity, and creativity.
Where our passion for better solutions drives us and is core to who we are.
We’re engineering for the future of retail, and it’s no‑holds‑barred. But for those motivated by continual change and ambiguity, by superior leadership, by whip‑smart colleagues who will press you daily for your very best, you’ll find that virtually nothing’s impossible at Ulta Beauty.
The Impact You Can HaveYou’ll be a key contributor in automating and enforcing cloud security across Ulta Beauty’s GCP ecosystem—building guardrails, securing workloads, and integrating real‑time detection and remediation capabilities to keep our cloud environments safe and compliant a Beauty is seeking a Senior Cloud Security Engineer with deep, hands‑on experience in securing and automating workloads within Google Cloud Platform (GCP). This role is responsible for implementing and maintaining scalable security controls, integrating security into CI/CD pipelines, and automating monitoring and remediation processes to protect data, identities, and workloads across cloud environments.
The ideal candidate has strong technical depth in GCP IAM, network security, and workload protection
, with a focus on execution and automation
, not architecture or solution design.
- Configure, deploy, and maintain data and infrastructure security controls across GCP and Azure environments (projects, folders, and org‑level).
- Design and enforce Identity and Access Management (IAM) configurations—roles, service accounts, and permissions—following least‑privilege and zero‑trust principles
. - Implement network security measures such as firewall rules, VPC Service Controls, Private Service Connect, and secure interconnects to safeguard data in motion.
- Secure GCP and Azure services including Cloud Storage, GKE, Cloud SQL, Pub/Sub, Cloud Functions, and Dataflow with a focus on data confidentiality and workload isolation
. - Implement data encryption and key management strategies using Cloud KMS, CMEK, and HSM integrations
. - Automate configuration baselines, guardrails, and policy enforcement using Terraform, Cloud Build, or Deployment Manager
. - Integrate cloud‑native security tools (Security Command Center, Cloud Logging, Cloud Monitoring) for visibility, compliance, and anomaly detection
. - Develop automation scripts and tooling (Python, Power Shell, Go) to detect, notify, and remediate misconfigurations or security drift.
- Build and maintain CI/CD integrations for vulnerability scanning, policy validation, and data protection controls.
- Use APIs and SDKs to connect cloud security data to central logging, SIEM, or analytics platforms (Chronicle, Splunk, Elastic).
- Implement automated workflows for security posture management, access reviews, and incident response
.
- Configure and tune alerts from CSPM tools (e.g., Prisma Cloud, Wiz) and GCP‑native monitoring solutions for network and IAM anomalies.
- Respond to cloud‑related security incidents
, including unauthorized access, network exposure, or data exfiltration attempts, by isolating resources and applying remediation. - Develop and maintain detection logic and dashboards to visualize network flows, IAM changes, and workload health.
- Participate in post‑incident reviews to strengthen controls for IAM, encryption, and workload security.
- Execute security assessments on cloud workloads, data storage, network segmentation, and CI/CD processes.
- Enforce compliance baselines (CIS, NIST 800‑53, Google Blueprint standards) through automated policy checks and reporting
. - Document security controls, policies, and exceptions with clear technical…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).