Epicareer Might not Working Properly
Learn More

Principal DevSecOps Engineer -Remote USA

  • Full Time, remote
  • NITYA Software Solutions, Inc.
  • Remote, United States of America
Salary undisclosed

Checking job availability...

Original
Simplified

Role: Principal DevSecOps Engineer

Location: Remote

C2C

Primary Responsibilities:

  • Create, develop, and implement solutions to address cloud infrastructure and security compliance requirements.
  • Create reusable CI/CD deployment patterns using Atmos, Spacelift, and ArgoCd.
  • Implement continuous container image vulnerability scanning against AWS ECR and JFrog registry using JFrog.
  • Enforce Github action workflows to perform daily IAC (terraform, docker, and helm) static scanning for all repos using TFsec.
  • Develop and deploy custom workflows for pre-commit and code merge actions to prevent risky container and IAC vulnerabilities using open-source scanners such as TFsec and Checkov.
  • Build and maintain enterprise OPA gatekeeper resource policies, leveraging Atmos and Gomplate to implement best practices for K8s on areas of network security, encryption, and access controls.
  • Create and align configuration drift and scanning policies against industry standards such as CIS Kubernetes benchmarks, NIST 800-63, or SOC 2.
  • Define playbooks for handling policy violations and misconfigurations in Kubernetes clusters.
  • Integrate centralized log collection against the DevOps techstack using Prometheus and Grafana.
  • Document and publish DevSecOps best practices and solutions as it relates to secure SDLC.
  • Troubleshoot, identify, and fix problems related to CI/CD compliance quality gate checks and critical and high vulnerability remediation.
  • Train and educate cross-functional team members on shift-left development processes and secure coding and cloud security policies.

Required Qualifications:

  • 2+ years working with DevOps orchestration solutions such as ArgoCD and Spacelift.
  • 3+ years with Gatekeeper Open Policy Agent and Rego policy expression writing.
  • 3+ years working with JFrog.
  • 3+ years working with open-source scanners such as TFSec and Checkov.
  • 4+ years working with Terraform and Helm.
  • 6+ years performing DevOps automation across various technology stacks and cloud providers.
  • 6+ years implementing large-scale, end-to-end technology solutions in an enterprise setting.

Preferred Qualifications:

  • Comprehensive technical experience working with DevSecOps toolkits, including GitHub Actions, Ansible, Atmos, Terraform, ArgoCD, Spacelift, JFrog, TFsec, Checkov, Gatekeeper OPA, or comparable technologies.
  • Familiarity with cloud-native monitoring tools (e.g., Prometheus, Grafana).
  • Knowledge of advanced Kubernetes security features like pod security admission controllers.
  • Familiarity with information security frameworks and standards such as CIS, NIST, and CSA.
  • Practical experience demonstrating shift-left approaches with development teams and communicating best practices.
  • Certifications: Certified Kubernetes Administrator (CKA), Certified Kubernetes Security Specialist (CKS), or related.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job

Role: Principal DevSecOps Engineer

Location: Remote

C2C

Primary Responsibilities:

  • Create, develop, and implement solutions to address cloud infrastructure and security compliance requirements.
  • Create reusable CI/CD deployment patterns using Atmos, Spacelift, and ArgoCd.
  • Implement continuous container image vulnerability scanning against AWS ECR and JFrog registry using JFrog.
  • Enforce Github action workflows to perform daily IAC (terraform, docker, and helm) static scanning for all repos using TFsec.
  • Develop and deploy custom workflows for pre-commit and code merge actions to prevent risky container and IAC vulnerabilities using open-source scanners such as TFsec and Checkov.
  • Build and maintain enterprise OPA gatekeeper resource policies, leveraging Atmos and Gomplate to implement best practices for K8s on areas of network security, encryption, and access controls.
  • Create and align configuration drift and scanning policies against industry standards such as CIS Kubernetes benchmarks, NIST 800-63, or SOC 2.
  • Define playbooks for handling policy violations and misconfigurations in Kubernetes clusters.
  • Integrate centralized log collection against the DevOps techstack using Prometheus and Grafana.
  • Document and publish DevSecOps best practices and solutions as it relates to secure SDLC.
  • Troubleshoot, identify, and fix problems related to CI/CD compliance quality gate checks and critical and high vulnerability remediation.
  • Train and educate cross-functional team members on shift-left development processes and secure coding and cloud security policies.

Required Qualifications:

  • 2+ years working with DevOps orchestration solutions such as ArgoCD and Spacelift.
  • 3+ years with Gatekeeper Open Policy Agent and Rego policy expression writing.
  • 3+ years working with JFrog.
  • 3+ years working with open-source scanners such as TFSec and Checkov.
  • 4+ years working with Terraform and Helm.
  • 6+ years performing DevOps automation across various technology stacks and cloud providers.
  • 6+ years implementing large-scale, end-to-end technology solutions in an enterprise setting.

Preferred Qualifications:

  • Comprehensive technical experience working with DevSecOps toolkits, including GitHub Actions, Ansible, Atmos, Terraform, ArgoCD, Spacelift, JFrog, TFsec, Checkov, Gatekeeper OPA, or comparable technologies.
  • Familiarity with cloud-native monitoring tools (e.g., Prometheus, Grafana).
  • Knowledge of advanced Kubernetes security features like pod security admission controllers.
  • Familiarity with information security frameworks and standards such as CIS, NIST, and CSA.
  • Practical experience demonstrating shift-left approaches with development teams and communicating best practices.
  • Certifications: Certified Kubernetes Administrator (CKA), Certified Kubernetes Security Specialist (CKS), or related.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job