Wednesday, January 14, 2026

Site Security Operations Engineer (SecOps/DevSecOps)

 

Part 1: Basic Information

  • Position: Site Security Operations Engineer
  • Employment Type: Full-time
  • Experience Level: 3–5+ Years
  • Location: [Your Location]

Part 2: Job Description

Position Objective: The Site Security Operations Engineer is responsible for the stability, integrity, and security of our web infrastructure. You will build proactive defense systems, ensure data protection, and lead the response to security incidents to safeguard business continuity.

Key Responsibilities:

  • Infrastructure Hardening: Secure and optimize web servers (Nginx/Apache), databases, and cloud-native services (AWS/Azure/GCP).
  • Defense Operations: Deploy and fine-tune security tools: WAF, IDS/IPS, Bastion Hosts, and SIEM (ELK/Splunk).
  • Vulnerability Management: Conduct regular scans and baseline checks. Collaborate with developers to remediate OWASP Top 10 vulnerabilities.
  • Incident Response (IR): Execute emergency protocols for breaches, DDoS attacks, or malware infections. Perform root cause analysis.
  • Security Automation: Develop Python/Go/Shell scripts to integrate security gates into CI/CD pipelines (DevSecOps).
  • Data Protection: Implement robust backup strategies and conduct regular Disaster Recovery (DR) drills.

Part 3: Requirements

Technical Qualifications:

  • Network Mastery: Deep understanding of TCP/IP, HTTP/HTTPS, DNS, and SSL/TLS management.
  • Application Security: Expert knowledge of web-based attacks (SQLi, XSS, CSRF) and mitigation methods.
  • System Admin: Strong proficiency in Linux/Unix administration and security hardening.
  • Automation: Professional experience in at least one scripting language (Python, Shell, or Go).
  • Cloud Security: Familiarity with Cloud IAM, Security Groups, and VPC isolation.

Preferred Skills (Plus):

  • Certifications: CISSP, OSCP, CISA, or AWS/Azure Security Specialty.
  • Containers: Experience with Docker/Kubernetes (K8s) security and image scanning.
  • Achievement: Previous experience in large-scale DDoS mitigation or Bug Bounty participation.

Part 4: Internal Evaluation (For HR Use Only)

  • MTTR (Mean Time to Remediate): Ability to drive vulnerability closing.
  • Analytical Thinking: Logical approach to troubleshooting under pressure.
  • Collaboration: Effectively communicating security risks to non-technical teams.