

Allegis Group
DevOps Engineer
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a DevOps Engineer with a contract length of "unknown," offering a pay rate of "unknown," and remote work location. Key skills include Jenkins, Groovy, advanced Python, and supply-chain security expertise. Requires 7+ years in engineering and 3+ in CI/CD or DevSecOps.
π - Country
United Kingdom
π± - Currency
Β£ GBP
-
π° - Day rate
Unknown
-
ποΈ - Date
November 21, 2025
π - Duration
Unknown
-
ποΈ - Location
Unknown
-
π - Contract
Unknown
-
π - Security
Unknown
-
π - Location detailed
England, United Kingdom
-
π§ - Skills detailed
#JSON (JavaScript Object Notation) #Python #SonarQube #GCP (Google Cloud Platform) #DevSecOps #Maven #Containers #Java #AWS (Amazon Web Services) #Groovy #Documentation #Metadata #Jenkins #Cloud #Terraform #Security #YAML (YAML Ain't Markup Language) #Compliance #DevOps #Automation
Role description
Own and evolve our Jenkins Shared Library powering multi-language builds (Java/Maven, Node/NPM, Python, Helm, Terraform, containers). Deliver fast, secure, provenance-rich pipelines (SLSA, SBOM, digests) and strengthen supplyβchain integrity across teams.
Core Responsibilities:
β’ Design and maintain Groovy pipeline steps (build, test, package, scan, deploy).
β’ Extend Python tooling for SLSA provenance, SBOM generation, hash/digest accuracy, and security scan aggregation (SonarQube, Sonatype IQ, SAST/Container).
β’ Optimize performance (parallel builds, caching, scope-reduced BOMs, dependency prefetch).
β’ Ensure artifact integrity (correct SHA1/SHA256 mapping, reproducible inputs, evidence modeling).
β’ Refactor legacy scripts (remove global state, consolidate hashing, standardize templates).
β’ Document ci-config.yaml standards and usage patterns.
β’ Mentor engineers on secure pipeline development and supply-chain practices.
β’ Troubleshoot and prevent pipeline incidents.
Essential Skills: -
β’ 7+ years engineering; 3+ in CI/CD platform or DevSecOps.
β’ Strong Jenkins + Groovy shared library expertise.
β’ Advanced Python automation (JSON/YAML processing, tooling scripts).
β’ Deep Maven/NPM/Python packaging knowledge; exposure to Helm/Terraform and container image metadata.
β’ Supply-chain security (SLSA, CycloneDX SBOM, digests).
β’ Experience with SonarQube, Sonatype IQ, container and SAST scanning.
β’ Proven performance tuning (caching, parallelization, dependency pruning).
β’ Compliance Awareness.
Nice-to-Have
β’ Artifact signing / attestations (cosign, OCI).
β’ Terraform module and Helm chart publishing patterns.
β’ GitOps or release automation experience.
β’ GCP/AWS cloud experience
Soft Skills: -
β’ Precise communicator
β’ documentation discipline. -
β’ Ownership mindset, able to operate with minimal supervision.
Own and evolve our Jenkins Shared Library powering multi-language builds (Java/Maven, Node/NPM, Python, Helm, Terraform, containers). Deliver fast, secure, provenance-rich pipelines (SLSA, SBOM, digests) and strengthen supplyβchain integrity across teams.
Core Responsibilities:
β’ Design and maintain Groovy pipeline steps (build, test, package, scan, deploy).
β’ Extend Python tooling for SLSA provenance, SBOM generation, hash/digest accuracy, and security scan aggregation (SonarQube, Sonatype IQ, SAST/Container).
β’ Optimize performance (parallel builds, caching, scope-reduced BOMs, dependency prefetch).
β’ Ensure artifact integrity (correct SHA1/SHA256 mapping, reproducible inputs, evidence modeling).
β’ Refactor legacy scripts (remove global state, consolidate hashing, standardize templates).
β’ Document ci-config.yaml standards and usage patterns.
β’ Mentor engineers on secure pipeline development and supply-chain practices.
β’ Troubleshoot and prevent pipeline incidents.
Essential Skills: -
β’ 7+ years engineering; 3+ in CI/CD platform or DevSecOps.
β’ Strong Jenkins + Groovy shared library expertise.
β’ Advanced Python automation (JSON/YAML processing, tooling scripts).
β’ Deep Maven/NPM/Python packaging knowledge; exposure to Helm/Terraform and container image metadata.
β’ Supply-chain security (SLSA, CycloneDX SBOM, digests).
β’ Experience with SonarQube, Sonatype IQ, container and SAST scanning.
β’ Proven performance tuning (caching, parallelization, dependency pruning).
β’ Compliance Awareness.
Nice-to-Have
β’ Artifact signing / attestations (cosign, OCI).
β’ Terraform module and Helm chart publishing patterns.
β’ GitOps or release automation experience.
β’ GCP/AWS cloud experience
Soft Skills: -
β’ Precise communicator
β’ documentation discipline. -
β’ Ownership mindset, able to operate with minimal supervision.






