
Request
Info
Function
DevOps EngineerLocation
AmersfoortHours per week
40 hours per weekDuration
February 1, 2026 - July 31, 2026Application number
SRQ177493Segment
ITClosing date
32–40 hours · Amersfoort/Hybrid · Energy market · Start: February 1, 2026 · Duration: 6 months, with option to extend
Hello interim Security Specialist AWS Cloud! Would you like to work at the heart of the energy transition?
EDSN is a rapidly growing organization. At EDSN, you will contribute to making the Netherlands more sustainable. Every day. Together with our partners in the energy sector. With your knowledge of AWS Cloud Security, Landing Zone governance, identity & access, secrets management, and network security, you will ensure a secure and compliant cloud foundation that market parties can build on. In doing so, you will contribute tosustainable market facilitation. We have big ambitions, which is why we are looking for you!
Manage, improve, and monitor the AWS security posture of the Atlas environment
Implementing and maintaining AWS Data Perimeter measures
Advising teams on secure-by-design architecture
Conducting security reviews, threat modeling, and risk analyses
Support with incident response and forensics
Developing and improving security policies, baselines, and guardrails
Collaborate with Cloud Engineers, POs, and Security teams to mitigate risks
You link EDSN's inspiring goal—accelerating the energy transition with securedata services—toAtlas's concrete challenge: keeping a multi-account AWS platform secure, demonstrably compliant, and easy to use.
Key challenges for the coming months:
You will work closely with our Product Owner and Scrum Master and coordinate regularly with other ITF teams. You will organize knowledge sessions, write guides, and work in pairs with engineers from customer teams to implementsecurity by design. (Collaboration with other teams, including Base64/Watchdog, occurs regularly in relation to network and core services.)
At least 5 years of experience with AWS security in enterprise/multi-account environments
In-depth knowledge of:
IAM, SSO, permission boundaries, identity federation
KMS, encryption standards, secrets management
GuardDuty, Security Hub, Detective, Config, CloudTrail
SCPs, Control Tower guardrails, multi-account governance
Data perimeter (pre)
Experience with IaC security (Terraform best practices, drift detection, policy-as-code)
Experience with incident response in cloud environments
Prerequisite: pentesting/red teaming experience
Terraform, CloudFormation
GitLab/GitHub CI/CD
CloudWatch, logging, monitoring
Security tooling within AWS (GuardDuty, Detective, Config, etc.)
Strong in documenting, challenging, and advising
Can translate complex security risks into concrete actions
Strong communication skills with both engineers and management
Proactive, critical, and ownership-driven
EDSN
32–40 hours · Amersfoort/Hybrid · Energy market · Start: February 1, 2026 · Duration: 6 months, with option to extend
Hello interim Security Specialist AWS Cloud! Would you like to work at the heart of the energy transition?
EDSN is a rapidly growing organization. At EDSN, you will contribute to making the Netherlands more sustainable. Every day. Together with our partners in the energy sector. With your knowledge of AWS Cloud Security, Landing Zone governance, identity & access, secrets management, and network security, you will ensure a secure and compliant cloud foundation that market parties can build on. In doing so, you will contribute tosustainable market facilitation. We have big ambitions, which is why we are looking for you!
Manage, improve, and monitor the AWS security posture of the Atlas environment
Implementing and maintaining AWS Data Perimeter measures
Advising teams on secure-by-design architecture
Conducting security reviews, threat modeling, and risk analyses
Support with incident response and forensics
Developing and improving security policies, baselines, and guardrails
Collaborate with Cloud Engineers, POs, and Security teams to mitigate risks
You link EDSN's inspiring goal—accelerating the energy transition with securedata services—toAtlas's concrete challenge: keeping a multi-account AWS platform secure, demonstrably compliant, and easy to use.
Key challenges for the coming months:
You will work closely with our Product Owner and Scrum Master and coordinate regularly with other ITF teams. You will organize knowledge sessions, write guides, and work in pairs with engineers from customer teams to implementsecurity by design. (Collaboration with other teams, including Base64/Watchdog, occurs regularly in relation to network and core services.)
At least 5 years of experience with AWS security in enterprise/multi-account environments
In-depth knowledge of:
IAM, SSO, permission boundaries, identity federation
KMS, encryption standards, secrets management
GuardDuty, Security Hub, Detective, Config, CloudTrail
SCPs, Control Tower guardrails, multi-account governance
Data perimeter (pre)
Experience with IaC security (Terraform best practices, drift detection, policy-as-code)
Experience with incident response in cloud environments
Prerequisite: pentesting/red teaming experience
Terraform, CloudFormation
GitLab/GitHub CI/CD
CloudWatch, logging, monitoring
Security tooling within AWS (GuardDuty, Detective, Config, etc.)
Strong in documenting, challenging, and advising
Can translate complex security risks into concrete actions
Strong communication skills with both engineers and management
Proactive, critical, and ownership-driven
For this assignment you need to place a bid on Striive. Striive is the largest assignment platform in the Benelux where more than 20,000 assignments are published annually.