Cloud Security Careers

Roles, salary bands, interview formats, portfolio projects, and how to translate from adjacent jobs into your first cloud security role. Written for the person trying to break in β€” and the practitioner figuring out the next step.

A professional job interview scene in a modern office setting
Photo by Tima Miroshnichenko on Pexels

Β· Β· Vendor-neutral Β· View source on GitHub

The honest version: "Cloud security engineer" isn't one job β€” it's at least seven, with very different day-to-day work, hiring bars, and pay bands. Most rejections come from applying to the wrong shape of role for your background, not from being underqualified. Read the role taxonomy first, then work backwards from the one that fits.

All numbers below are US-centric, late-2025 / early-2026, and approximate. Adjust for region, industry, and company size. Outside the US, halve and add a question mark.

πŸ“– On this page

  1. The roles (and what they actually do)
  2. Salary bands
  3. What hiring managers look for
  4. Interview formats
  5. Portfolio projects worth building
  6. Translating from adjacent roles
  7. The application game
  8. Common mistakes
  9. Where next
Cloud security career tracks Common progression from entry roles through senior into five specialty branches. Career tracks β€” most cloud security pros land somewhere in this map ENTRY SOC Analyst Cloud / DevOps Eng MID-LEVEL Cloud Security Engineer SENIOR Sr. Cloud Security Engineer ARCHITECTCloud Securitystrategy, design DETECTION ENGDetection &SIEM content INCIDENT RESPCloud IR Leadforensics, recovery APPSEC / CNAPPPlatform & AppSecSAST, IaC, runtime GRC / COMPLIANCECompliance LeadSOC 2, ISO, FedRAMP
The most common path is left-to-right; specialization usually happens around year 4–6. The role descriptions below match these branches.

The roles (and what they actually do)

Job titles vary wildly β€” "Cloud Security Engineer" at one company is "Detection Engineer" at another. Read the responsibilities, not the title. Most teams have at least two of these, sometimes blended into one person.

Each role below includes a "Natural fit if you currently…" note β€” the backgrounds and day-to-day work that map cleanly into that role. If two or three of the bullets describe your current job, that's the role you'll ramp fastest into.

Cloud Security Engineer (generalist)

The default role. Configures and reviews IAM, owns the CSPM tool and triages findings, writes guardrail policies (SCPs, Azure Policy, Org Policy), reviews cloud architectures during design, automates security tooling. Half the day is in code review and Terraform PRs; the other half is in IAM consoles and the SIEM. Demands breadth over depth.

Natural fit if you currently:

Detection Engineer (cloud-focused)

Builds and maintains the rules that catch attackers in cloud environments. Writes Sigma / KQL / SPL detections, maps coverage to MITRE ATT&CK Cloud, tunes false positives, runs purple-team exercises with Stratus Red Team / Atomic Red Team. Highly technical, mostly written in code. Strong career arc into senior IC tracks.

Natural fit if you currently:

Cloud Incident Responder / DFIR

The pager-carriers. When GuardDuty fires or a customer reports a leak, this is who investigates. Knows what evidence each cloud actually retains (and what it doesn't), reads CloudTrail at speed, scopes blast radius, drives containment and recovery. Often blended with detection engineering at smaller orgs.

Natural fit if you currently:

Cloud Penetration Tester / Red Team

Offensive. Audits cloud environments by attacking them, often via consultancy or as an internal red team. Lives in Pacu, ROADtools, custom scripts. Reports look like breach kill chains. Smaller market than defensive roles, but high pay and prestige at the senior end.

Natural fit if you currently:

CSPM / CNAPP Analyst

Lives inside Wiz, Orca, Lacework, Prisma Cloud, Defender for Cloud, or similar. Triages findings, drives remediation, builds custom policies, runs reporting for leadership. Common entry-level role at companies that bought a CNAPP and need humans to make it useful. Underrated path in.

Natural fit if you currently:

IAM / Identity Architect

The most strategically important specialization right now. Designs identity boundaries (cross-account access, federation, conditional access, service-to-service auth), builds least-privilege policy frameworks at scale, owns the IdP integration. Senior IC track in most large orgs, often the closest thing to "Cloud Security Architect" with a real job to do.

Natural fit if you currently:

Cloud AppSec / IaC Security

Sits between security and the application teams. Owns IaC scanning (Checkov, Terrascan, KICS, tfsec), container image scanning, dependency review in CI/CD, secret scanning, supply-chain controls. Strong fit for developers moving into security β€” very PR-driven, very code-centric.

Natural fit if you currently:

Cloud GRC / Compliance Engineer

Translates frameworks (SOC 2, ISO 27001, FedRAMP, HIPAA, PCI) into cloud controls. Owns the audit relationship, automates evidence collection (Drata, Vanta, Secureframe), maps controls to AWS Config / Azure Policy rules. Less code-heavy, more cross-functional. Paths to security leadership.

Natural fit if you currently:

Security SRE / Platform Security

Builds the security platform other engineers use: shared SIEM pipelines, secret rotation services, golden VPC patterns, account-vending automation. The "security as a product" team. Often the highest-leverage role on a security org.

Natural fit if you currently:

Cloud Security Architect / Staff+ IC

Senior strategic role. Sets technical direction, reviews high-stakes designs, owns the security roadmap for a business unit or product area. Usually 8+ years of operational experience first. Often has no individual deliverables β€” the deliverable is alignment.

Natural fit if you currently:

High-angle view of a contract document with pens on a wooden table
Photo by RDNE Stock project on Pexels

Salary bands (US, late 2025 / early 2026)

Approximate ranges for general industry. Big-tech total comp can be 1.5-2x these numbers. Federal contractors and consulting firms tend lower on base, sometimes higher on cash bonus.

For real numbers, check levels.fyi for big-tech comp, the BLS information security analysts data for general industry, and recent salary threads on r/cybersecurity for anecdata. Bring real numbers to negotiations.

Business professionals networking in a conference room setting
Photo by Pavel Danilyuk on Pexels

What hiring managers actually look for

Distilled from interviewing hundreds of cloud security candidates and from years of conversations with hiring peers. The order matters.

  1. Hands-on evidence with the cloud you'll be working in. Public CloudGoat write-ups, blog posts, GitHub repos, conference talks. One CTF write-up beats three certs every time.
  2. The ability to explain IAM precisely. If you can't explain the difference between an identity-based and a resource-based policy, or between AssumeRole and trust policies, you fail the technical screen at most shops.
  3. Comfort with the command line and Terraform/CDK/Pulumi. Cloud security is API-first. The console is for hiring managers, not engineers.
  4. One cloud at depth, not three at surface. "I know AWS well, Azure passably, GCP barely" beats "I know AWS, Azure, and GCP" 90% of the time. Pick one.
  5. Specific incident or breach knowledge. Be able to walk through Capital One, MOVEit, MGM/Scattered Spider, or whatever's recent. The breach kill chains are interview fodder.
  6. A relevant cert as a baseline filter. Recruiters use certs to pass the resume screen. CCSK or your cloud's security specialty does the job. See the certifications guide.
  7. Communication. Most senior cloud security work is influence β€” convincing engineering teams to fix things. Candidates who write well and explain trade-offs without jargon stand out fast.
  8. Curiosity and momentum. "What did you learn last month?" If the answer is "nothing in particular," that's a no.
Hands-on portfolio plus a relevant cert beats a degree without practical work, every time. β€” from the careers FAQ above

Interview formats you'll actually see

Loops vary, but the modules below cover ~90% of what shows up. Practice each one before you need to.

Portfolio projects worth building

Your portfolio is your interview. Pick three of these, do them well, write each one up publicly. A blog (Substack, GitHub Pages, dev.to) plus a public GitHub is enough β€” no fancy site needed.

Each link below is a step-by-step walkthrough β€” prerequisites, the actual steps, what hiring managers look for in the write-up, and the common mistakes to avoid:

  1. Walk every CloudGoat scenario. Publish your kill chain, screenshots, and remediation for each. The canonical project β€” most interviewers have done it themselves and will recognize you've done the work.
  2. Build a multi-account AWS Organization with SCPs. Terraform a 3-account org, IAM Identity Center, and a baseline of SCPs. Push the code to GitHub. Real production-shaped work.
  3. Run Prowler against your own account and remediate everything. Document the before/after. Bonus: turn the remediation into Terraform.
  4. Build 5 detections in a lab SIEM. Spin up Wazuh, Elastic, or Matano; pick five MITRE ATT&CK Cloud techniques and write Sigma rules; validate with Stratus Red Team.
  5. Take a real breach, rebuild it in a lab. Recreate the Capital One architecture in your own account, exploit it end-to-end, then build the controls and detections that would have stopped it. Best single portfolio piece you can ship.
  6. Contribute to an open-source cloud security tool. Prowler, Cloud Custodian, Pacu, ROADtools, KICS, Steampipe β€” all welcome contributors. Even a small PR is a strong signal.
  7. Write a CNAPP comparison. Pick three (Wiz, Orca, Defender for Cloud, Prisma, Lacework) and write an honest comparison. Hands-on trial work, false-positive sampling, and a who-should-pick-which section.

See the full portfolio playbook for time estimates, difficulty, and how to talk about each one in interviews.

What not to do: don't build a "cloud security dashboard" toy webapp. Hiring managers see hundreds. Build operational artifacts that look like real work.

Translating from an adjacent role

Most people don't enter cloud security cold. They pivot. The fastest path is usually one role-step from where you are now, not a leap straight to "Cloud Security Engineer."

From SOC analyst

You already understand alerts, triage, and incident workflow. Add: cloud-native log sources (CloudTrail, Activity Log, Audit Logs), GuardDuty / Defender / SCC, and one cloud's IAM model. Target: cloud-focused SOC roles or detection engineering.

From DevOps / SRE

You already know IaC, CI/CD, and at least one cloud at depth. Add: IAM specifics, threat modeling, posture management, common misconfigurations. Target: Cloud AppSec, IaC security, or platform security. Often the fastest pivot β€” security teams are desperate for engineers who can actually ship code.

From software developer

You know systems and code review. Add: AppSec fundamentals (OWASP Top 10), IaC scanning, supply-chain controls, container security. Target: Cloud AppSec, secure-by-design consulting roles. Strong pivot if you're a senior dev β€” security pays similarly and the work is varied.

From sysadmin / network engineer

You understand systems, networks, and "how things actually break." Add: IaC, the cloud-native equivalents of what you already do (security groups vs. firewall rules, IAM vs. AD, etc.), and one cloud's services. Target: cloud security generalist or network-security-in-cloud roles.

From traditional security (on-prem, GRC, AppSec)

You have the security mental model. Add: at least one cloud at operational depth, cloud-specific tooling, IaC. Target: the equivalent of your current role but cloud-flavored. Easiest pivot conceptually, hardest practically because hiring managers look hard for hands-on cloud evidence.

From totally outside tech

Longest road, but doable. Stage 1: get into IT (helpdesk, sysadmin, junior cloud). Stage 2: pivot to security from there. Trying to leap directly into a cloud security role is rarely successful. Plan for 18-36 months.

The application game

Common mistakes

Where next