DevSecOps Engineer (AWS) | Full Tiime | Remote | US Only
Posted 2026-05-05
Remote, USA
Full-time
Immediate Start
We’re Hiring: Senior DevSecOps Engineer (AWS) – Remote
If you’re the kind of engineer who
thinks like an attacker, builds like an architect, and executes like an operator
, this role is worth your attention.
We’re looking for a
hands-on Senior DevSecOps Engineer
to own and evolve the security posture of an AWS-based platform in the healthcare space—where
security, reliability, and real-world impact
matter.
- What makes this role compelling:
- You’ll own security end-to-end(not just advisory)
- Work on a live production platformwith real users and real risk
- Build secure-by-default pipelines(SAST, DAST, SCA, secrets, container scanning)
- Drive cloud security architecture across AWS(IAM, KMS, GuardDuty, Security Hub)
- Lead threat detection + incident response strategy
- Influence SOC 2 readiness and policy-as-code implementation
- What we’re looking for:
- 5+ years in DevSecOps / Cloud Security (AWS)
- Deep experience with CI/CD security + automation
- Strong foundation in Terraform, Docker, and AWS services
- Experience with SIEM, logging, and incident response
- Someone who doesn’t wait to be told—sees gaps and fixes them
- What success looks like:
- Security embedded directly into pipelines
- No hardcoded secrets—ever
- Full visibility across logs, events, and threats
- Vulnerabilities prioritized and remediated fast
- A platform that’s both secure and scalable
- ✨Who you are:You’re proactive, pragmatic, and calm under pressure. You cantranslate security into business impactand drive decisions that matter.Required Qualifications
- 5+ years in DevOps, Cloud Engineering, or Security Engineering, with a minimum of 5 years in a security-focused DevSecOps or Cloud Security role.
- Demonstrated hands-on experience with: EC2, RDS (Aurora), S3, VPC, IAM, KMS, Secrets Manager, CloudTrail, GuardDuty, Security Hub, AWS Config, WAF, Systems Manager, and Lambda.
- Proven implementation of SAST, DAST, SCA, secret scanning, and container image scanning gated within CI/CD pipelines (GitHub Actions, GitLab CI, or equivalent).
- Experience writing and securing Terraform at production scale. Familiarity with tfsec, Checkov, or Sentinel for policy enforcement.
- Experience hardening Docker images, scanning with Trivy or Grype, and managing ECR lifecycle policies. Experience with ECS/EKS security configurations (task role least-privilege, network policy, runtime security).
- Hands-on experience with AWS Secrets Manager and/or HashiCorp Vault including automated rotation and zero-plaintext-credential enforcement.
- Experience configuring GuardDuty, CloudTrail, and Security Hub. Ability to write detection rules/queries in a SIEM environment.
- Experience operating a vulnerability scanning program (Amazon Inspector, Tenable, Qualys) with SLA-based remediation tracking.
- Proficient in Python and Bash for automation. Ability to independently write Lambda functions, CLI tooling, and operational scripts.
- Experience leading or co-leading security incident response in a cloud environment, including evidence preservation and post-incident reporting.
- Proven experience in customer-facing Technical Program Management, including end-to-end ownership of SaaS platform delivery and operations from a DevSecOps perspective.
- Preferred Qualifications
- Certifications (strongly preferred). AWS Security Specialty (SCS-C02), AWS Solutions Architect Associate/Professional, GIAC Cloud Security Essentials (GCLD), GIAC Public Cloud Pentester (GPCS), OSCP, or equivalent offensive/defensive cloud certification.
- Experience deploying or operating SaaS Security Posture Management tooling (Obsidian, AppOmni, Valence, Reco).
- Experience with AWS API Gateway security controls, OAuth 2.0 / OIDC hardening, and automated API security testing (42Crunch, Spectral, OWASP ZAP).
- Experience with OPA/Rego, Terraform Sentinel, or AWS Service Control Policies for automated policy enforcement.
- Experience writing correlation rules, detection logic, and dashboards in Splunk, Elastic, or Datadog SIEM.
- Experience generating and managing SBOMs (CycloneDX/SPDX), SLSA framework implementation, or Sigstore/Cosign artifact signing.
- Familiarity with CIS Controls, NIST CSF, SOC 2 Type II, or NIST 800-53. Experience supporting external audit