Overview
we are seeking a highly skilled and experienced devsecops engineer (traditional infrastructure focus) to support critical customer engagement. This role is ideal for an experienced professional who operates at the intersection of development, security, and traditional on‑premise operations, bridging the gap between application security and legacy infrastructure.
* implement security practices and tools within ci/cd pipelines to ensure traditional applications and infrastructure configurations are scanned for vulnerabilities.
* develop and maintain automation scripts using perl, python, or shell to reduce manual effort for routine bare‑metal provisioning and network operations.
* operate and support physical network security infrastructure, managing firewall rules, vpns, and routing security.
* key responsibilities include troubleshooting complex network security incidents (ddos mitigation), managing security monitoring tools for on‑premise hardware, maintaining centralized authentication (tacacs+, radius), and performing physical server upgrades/patching.
required qualifications
* 3 to 5 years of related work experience in devsecops, network security operations, or traditional infrastructure support.
* bachelor's degree in engineering, computer science, information technology, or equivalent practical experience.
* proficiency in perl is essential to maintain and enhance existing legacy operational tools and scripts that form the backbone of the current on‑premise environment.
* strong hands‑on operational experience with enterprise networking infrastructure, including routers, switches, hardware firewalls (e.g., juniper srx/mx, cisco), and vpns.
* deep knowledge of linux and unix‑based systems (e.g., rhel, freebsd) operating in a bare‑metal or traditional network support context.
* experience building and maintaining ci/cd pipelines (jenkins, gitlab ci) and integrating automated security testing into those workflows.
* proficiency in additional scripting languages (python, bash) to automate modern on‑premise workflows.
* familiarity with configuration management and infrastructure as code tools like ansible, puppet, or terraform applied to physical networks and traditional server environments.
* high level understanding of core routing, switching, and security protocols including bgp, ospf, is‑is, ipsec vpns, and macsec.
useful qualifications
* relevant security certifications such as cism, cissp, or ceh.
* experience with monitoring, telemetry, and alerting systems like prometheus, grafana, or elk‑based stacks.
* familiarity with packet filtering and host‑based firewall technologies (e.g., iptables, ipfw).
* working knowledge of modern data formats (json, yaml, xml).
#j-18808-ljbffr