Rashid Hossain Cloud Security Engineer
San Francisco, CA • cloudsec@gmail.com • +1 415-555-0119
Profile Summary
- Cloud Security Engineer with 10 years of experience securing multi-cloud fintech estates across fintech, payments, and consumer financial services, specializing in cloud security architecture, IAM hardening, and CSPM at scale.
- Solid technical background across clouds (AWS, GCP), CSPM (Wiz, Prisma Cloud), IaC security (Terraform, Checkov), detection (GuardDuty, CloudTrail), container orchestration on EKS, and secrets management with HashiCorp Vault, with strong fundamentals in least-privilege IAM, policy-as-code discipline, and continuous CSPM-driven remediation.
- Deep expertise in multi-cloud security architecture, cloud IAM and federation hardening, CSPM and continuous-drift detection, and cloud-native threat detection and response, applying practices such as the AWS Well-Architected Security Pillar and CIS Benchmarks and NIST CSF alignment to deliver secure, well-governed, and audit-ready cloud estates.
- Engaged collaborator working cross-functionally with Platform Engineering, SRE, and Application Security leadership in DevSecOps-first engineering organizations, contributing to change-advisory boards, blameless post-incident reviews, and shift-left security forums with a pragmatic, ownership-first mindset.
- Senior practitioner who shares technical excellence and fosters a culture of policy-as-code discipline and ticket-free remediation through guardrail authorship and design coaching, while running cloud security guild sessions and authoring widely adopted Terraform-module security baselines.
Technical Skills
- Cloud Architecture & Frameworks:
- AWS, Azure, GCP, AWS Well-Architected Security Pillar, CIS Benchmarks, NIST CSF, Cloud Adoption Framework, landing zones
- IAM & Identity:
- AWS IAM, Entra ID, GCP IAM, Okta, federation, SCPs / OUs, Conditional Access, JIT access, role boundaries
- CSPM / CNAPP:
- Wiz, Prisma Cloud, Orca, Lacework, AWS Security Hub, Microsoft Defender for Cloud, GCP Security Command Center
- Workload & Container:
- EKS, AKS, GKE, ECS, Lambda, Cloud Functions, Falco, OPA Gatekeeper, Kyverno, image scanning (Trivy, Snyk)
- Cloud Network Security:
- VPCs / VNets, security groups, NSGs, private endpoints, transit gateways, AWS WAF, Shield, Front Door, Zero Trust
- Data Protection & Encryption:
- AWS KMS, Azure Key Vault, GCP KMS, CMKs, HSMs, envelope encryption, Macie, Purview, GCP DLP, secrets management
- IaC Security & Policy-as-Code:
- Terraform, CloudFormation, Bicep, Pulumi, Checkov, tfsec, KICS, Terrascan, OPA / Rego, Sentinel
- Compliance & Audit:
- SOC 2, ISO 27001, PCI DSS, HIPAA, FedRAMP, CIS, control mapping, tagging strategy, audit evidence pipelines
Education
Work Experience
- Own the cloud security architecture for Block's multi-cloud fintech estate across 120+ accounts and projects, coordinating landing-zone design, IAM and identity guardrails, and CSPM and drift detection with influence across 180 engineers across 14 product teams.
- Hardened cloud IAM through least-privilege policy refactors, federated SSO with Conditional Access, and just-in-time access, retiring 42 over-privileged roles and clearing IAM Access Analyzer to zero high-risk findings in 6 months.
- Operate the CSPM platform on Wiz across 120 accounts, cutting open high-severity findings from 640 to 38 over 14 months through prioritized fix campaigns and policy-as-code guardrails.
- Run the container security program across 38 EKS clusters with Falco runtime detection and OPA Gatekeeper admission policies, sustaining 96% image scan coverage and zero unsigned-image deploys to production.
- Designed the Zero Trust cloud network across 48 VPCs, with transit-gateway hub-and-spoke topology, private endpoints by default, and AWS WAF + Shield on tier-1 public surfaces, eliminating all 14 internet-facing legacy paths during the migration.
- Manage data protection on AWS KMS with customer-managed CMKs, S3 bucket encryption and access policies across 12,000+ buckets, and Macie-driven sensitive-data discovery, retiring 4 legacy key stores.
- Built the cloud detection pipeline on GuardDuty + CloudTrail + Chronicle SIEM, owning ~80 cloud incidents per quarter and cutting MTTR on cloud-specific findings (credential abuse, S3 exposure, privilege escalation) from 6 hours to 42 minutes.
- Owned the IaC security program scanning Terraform modules with Checkov and tfsec in CI, blocking 1,400+ policy violations before merge over 30 months and standardizing the org's Terraform module library.
- Built Lambda-driven auto-remediation for the top-10 misconfigurations (public S3, unencrypted EBS, overly permissive security groups), automating cleanup of 2,300+ findings per quarter across 8 AWS accounts.
- Mentored 6 mid-career engineers through cloud security certifications (CCSP, AWS Security Specialty), and authored the team's onboarding runbook adopted by 3 sister units.
- Partnered with Platform Engineering, SRE, and Compliance teams across 5 product surfaces, authoring 22 cloud security runbooks and onboarding 4 new cloud security engineers into the team's change-management workflow.