Cloud Security Engineer

Location: Remote, CO, United States of America


ZOLL Medical is a growing, innovation-driven company on the forefront of delivering medical devices to save lives, and software solutions to improve efficiency. With customers in more than 140 countries, we continue to expand our reach, as well as our product offerings. Hospitals, emergency medical services (EMS), and others trust us to provide high-quality products and exceptional customer service. ZOLL products are used every day across the globe to save the lives of people who suffer sudden cardiac arrest. From Real CPR Help® technology—an industry first—to the world’s only wearable defibrillator, our capabilities and features set us apart. But none of this would be possible without the motivation and dedication of ZOLL employees, and we’re invested in their success.

We offer competitive salaries and a comprehensive benefits package. Join our team. It’s a great time to be a part of ZOLL!


  • Lead Engineering efforts to adopt new cloud-based security tools and controls.

  • Maintain and Operationally support Cloud Security infrastructure across various providers such as Azure, GCP, AWS, utilizing various cloud native tools such as Prisma Cloud, CASB, DLP, Zscaler, Microsoft Advanced Threat Protection, and others.

  • Development and maintenance of a collaborative, cross functional, technical and operational roadmap for Cloud Security Operations.

  • Provide effective troubleshooting and sustainable resolution of issues pro-actively detected and/or escalated to the team.

  • Evaluate and develop risk outcome focused secure solutions based on best practice and approved security architectures.

  • Serve as a security expert in areas such as vendor risk management, application development, database design, network, cloud-based services and/or platform (operating system) efforts, helping comply with enterprise and IT security policies, industry regulations, and best practices.

  • Research, design, implement, and/or advocate new technologies, architectures, and security products that will sustainably support security requirements for the enterprise, our customers, business partners, and vendors.

  • Work with architects, and security specialists to ensure appropriate risk based security solutions are in place throughout all IT systems, vendor assessments, and platforms.

  • Effectively mitigate risk to meet business objectives and regulatory requirements.

  • Analyze business impact and exposure based on emerging security threats, vulnerabilities, countermeasures, and risks. Proactively communicate security risks and solutions to business partners and IT staff as needed.

  • Act as a resource providing appropriate direction, training and guidance for less experienced staff while serving as a technical expert to the organization.

  • Effectively support awareness via training of our workforce regarding information security standards, policies, and best practices.

  • Installation and effective operational use of security appliances, software, outsourced services, and surveillance capabilities.

  • Incident response technical leadership on behalf of the department including steps to minimize impact and conduct technical and forensic investigations including identification of impact .

  • Monitor security controls for events, breaches, compliance, and conduct investigations as appropriate.


  • Comprehensive knowledge of cross-platform technical principles, security practices, and procedures for private/public cloud computing, distributed systems, desktop computers, laptops, tablets, phones, and workstations is desired.

  • Proven ability to work as a small project leader or subject matter expert on multiple projects of high complexity that require in-depth knowledge and operational expertise.

  • Personal experience with establishing and implementing policies and procedures protecting information flow to and from large numbers (i.e., over 1,000) of users accessing company information.

  • Practitioner level experience with enterprise on premise, cloud, and hybrid-based data network configuration and infrastructure concepts, including TCP/IP routers, internet/intranet/extranet, firewalls, web servers and security hierarchy including the application of encryption key infrastructures and authentication processes.

  • General knowledge and experience with security technologies including public and private key encryption, digital certificates, Kerberos, challenge/response, smart card, Secure ID or one-time password authentication mechanisms, Java, HTML-5, and ActiveX.

  • Experience working with waterfall, DevOps, and agile product development methodologies a plus.

  • Experience and relevant knowledge implementing security controls based upon OWASP, NIST CSF, PCI DSS frameworks and controls.

Typical Experience

  • 3 years of cloud experience with a minimum of 1 year operating within an Azure environment.

  • Experience with cloud monitoring tools such as (Cloud Security Posture Management (CPSM) and Cloud

  • Workload Protection Platform (CWPP) tools

  • Cloud certifications (Azure, AWS or GCP)

  • Cloud security certifications (e.g., Certified Cloud Security Professional, Certificate of Cloud Security Knowledge, etc.)

  • Hands on experience of MS Azure & O365 Solutions and related controls

  • Typically has 10 or more years of combined IT and security work experience in mid-size or large environment with a broad exposure to infrastructure/network, cloud, and multi-platform environments.

  • Four or more years as an Information Systems practitioner across multiple infrastructure and/or application disciplines such as networking, servers, storage, application development, application quality assurance.

  • Three or more years as an Information Security practitioner working in a Security Operation Center.

  • Strong verbal and written communication skills with the ability to articulate risks and findings to business partners and management.

Salary for this position is $125,000-$150,000 annually. Final compensation will be determined by various factors such as a candidate’s relevant work experience, skills, certifications, and location.