

Cloud Engineer
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Cloud Security Engineer (OCI) on a 1-year freelance contract, remote (U.S. based), at up to $70/hr. Requires 5+ years in cybersecurity, 3+ years with OCI, proficiency in Terraform and Ansible, and IAM expertise.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
560
-
ποΈ - Date discovered
June 13, 2025
π - Project duration
More than 6 months
-
ποΈ - Location type
Remote
-
π - Contract type
1099 Contractor
-
π - Security clearance
Unknown
-
π - Location detailed
United States
-
π§ - Skills detailed
#Firewalls #Bash #AWS (Amazon Web Services) #Oracle #Ansible #Scala #Logging #GitHub #Security #Cybersecurity #Compliance #Python #Monitoring #IAM (Identity and Access Management) #"ETL (Extract #Transform #Load)" #Oracle Cloud #Storage #Terraform #DevSecOps #Automation #Scripting #Splunk #Datadog #Cloud
Role description
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
Job Title: Cloud Security Engineer (OCI)
Type: Freelance, 40 hrs/week
Start: July 2025
Length: 1 year contract, with potential to extend
Location: Remote (U.S. based)
Compensation: Up to $70/hr DOE
A fast-growing enterprise platform is seeking a hands-on Cloud Security Engineer with deep Oracle Cloud Infrastructure (OCI) experience. This role will manage security, automation, and compliance across a complex multi-cloud environment, supporting critical infrastructure and cross-functional initiatives.
What Youβll Be Doing
β’ Configure and maintain OCI compute, networking (VCNs, subnets, gateways), storage, and load balancers
β’ Enforce traffic-control policies across OCI and multi-cloud environments (e.g., AWS transit, firewalls, NAT gateways)
β’ Implement and manage IAM (policies, compartments, dynamic groups, federation)
β’ Apply CIS Benchmarks and hardening across infrastructure
β’ Manage patching, vulnerability remediation, and secure configuration pipelines
β’ Operate and improve end-to-end monitoring with tools like Datadog, OCI Metrics, PagerDuty
β’ Build and maintain Infrastructure-as-Code using Terraform, GitHub, and GitHub Actions
β’ Orchestrate config and patch management at scale with Ansible
β’ Maintain backups, HA, and DR readiness in OCI
β’ Investigate and remediate security events using OCI-native tools (Cloud Guard, Security Zones, Logging)
β’ Collaborate with security, engineering, and finance teams to optimize cost, security, and scalability
β’ Document processes, controls, and support internal knowledge transfer
Must-Haves (Donβt Apply Without These)
β’ 5+ years in cybersecurity or infrastructure security roles
β’ 3+ years hands-on with Oracle Cloud Infrastructure (OCI)
β’ Deep knowledge of IAM, VCNs, compartments, and OCI security tools
β’ Proficiency in Terraform and Ansible
β’ Experience with patching, compliance (e.g., SOC 2, HIPAA), and system hardening
β’ Familiarity with monitoring and alerting tools like Datadog
β’ Scripting ability in Bash or Python for automation and incident response
β’ Experience with tools like Crowdstrike, Tenable, Teleport, SIEM
Youβll Stand Out If Youβ¦
β’ Hold OCI Security or Architect certifications
β’ Have experience with hybrid (on-prem + OCI) setups
β’ Worked with SIEM integrations (Splunk, QRadar)
β’ Are familiar with DevSecOps practices and GitHub Actions CI/CD
β’ Know logging tools like Cribl Stream
β’ Have AWS networking experience and understand multi-cloud environments
This is a 12-month freelance contract (40 hrs/week), fully remote. Performance-based extension possible.