Europa Search
Cloud Security consultant
Europa SearchSweden5 days ago
ContractInformation Technology

Background

  • There is a requirement to ensure the product security and compliance for one of the buisness area in client.
  • The scope of the consultant services is to assist client in
  • Assess and provide advice and support on security and privacy controls throughout the software design and acquisition process.
  • -Support the implementation of cyber security and data privacy frameworks, securing compliance with laws and regulations.
  • • Perform CSP risk analyses, maturity assessments, and threat modelling exercises.
  • • Support in security controls in the cloud infrastructure and products (Primarily in Azure) and Support cloud security posture improvements in Azure.
  • • Translate security and privacy findings into actionable risks that the business can use to make informed and conscious decisions.
  • • Identify and analyze vulnerabilities in networks, applications, and infrastructure.



  • Requirements:
  • Desired knowledge, experience, competence, skills etc
  • Understanding of Product Architecture:
  • Ability to evaluate threat surfaces in APIs, cloud-native systems, and IoT products.
  • Deep familiarity with microservices, containers (Docker/Kubernetes), and edge devices.


  • Cloud Security Design:
  • Expertise in securing AWS, Azure, or GCP architectures (IAM, encryption, secrets management).
  • Zero Trust & Secure Design Principles:
  • Applying least privilege, defense-in-depth, and secure-by-design principles across product lifecycles.
  • Secure Software Development Lifecycle (SSDLC):
  • Experience embedding security controls and checks into CI/CD pipelines.
  • Understanding of threat modeling (STRIDE, PASTA, LINDDUN).
  • Code review for security flaws (esp. in Python, Java, C/C++, or Go).


  • Vulnerability Management:
  • Expertise in identifying, triaging, and remediating product vulnerabilities.
  • Familiarity with CVSS scoring and vulnerability disclosure processes.


  • Regulatory Alignment:
  • Understanding of ISO 27001, SOC 2, NIST CSF, GDPR, .
  • Security Risk Assessment:
  • Translating technical vulnerabilities into business impact.



  • Supporting product managers and developers in risk-based prioritization.
  • What 3 things from the box above are most important?
  • Security Architecture
  • Cloud Security Design
  • Security Risk Assessment:

Key Skills

Ranked by relevance