Security & Compliancedaemon-blockint-tech/agen...
information-security-engineer
Guides information security engineering—implementing and operating security controls, identity and
access systems, encryption and secrets management, security tool integrations (SIEM, EDR, SOAR),
cloud guardrails, hardening baselines, and remediation engineering for vulnerabilities.
Use when building SSO/RBAC/PAM patterns, configuring KMS or certificate lifecycle, deploying WAF/DLP
or EDR connectors, writing security-as-code policies (OPA, SCPs, CIS benchmarks), integrating
logging to SIEM, automating security workflows, or validating control fixes—not for SOC triage
(soc-analyst), pentesting (penetration-tester, network-pentester, web-pentester), red team
(red-team-specialist), CI gates only (devsecops), platform provisioning without security ownership
(infrastructure-engineer), CISO/exec program (chief-information-security-officer),
security program strategy (cybersecurity), GRC program and audit prep (compliance-specialist),
or product tenancy isolation (product-infrastructure-security-engineer).