

Secdevops
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a SecDevOps Engineer, remote for a contract length of "unknown." Pay rate is "unknown." Requires 3-5 years in vulnerability management, experience with Kubernetes, CI/CD, and scripting. Knowledge of PCI-DSS and security tools is preferred.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
-
ποΈ - Date discovered
September 20, 2025
π - Project duration
Unknown
-
ποΈ - Location type
Remote
-
π - Contract type
W2 Contractor
-
π - Security clearance
Unknown
-
π - Location detailed
United States
-
π§ - Skills detailed
#Cloud #Jenkins #Splunk #Documentation #Scripting #Vulnerability Management #Scala #Visualization #Hadoop #Public Cloud #Python #Programming #DevOps #Compliance #Kubernetes #Linux #PCI (Payment Card Industry) #Security #Unix #GitHub #Bash
Role description
Greetings from Flexton!
Hope you are doing great today!
One of my clients is looking for SecDevops Engineer:W2@ Remote please share me your updated resume and desire rate for this position.
Job Description:
Key Responsibilities
Conduct vulnerability scans, analyze reports, and validate potential findings; contribute to process improvements; and documentation.
Configure and manage vulnerability scanners for both VM and Container (Kubernetes) environments (Public cloud is ok too, keeping), including their integration into eBayβs software development lifecycle.
Track and guide Vulnerability remediation efforts across the organization. Escalate issues and problems when needed.
Coordinate PCI-DSS vulnerability scans, and support other compliance and risk management activities in Vulnerability Management
Must be able to interface and coordinate work efficiently and effectively with business colleagues and vendors in global locations and time zones
Requirements:
3 to 5 years of demonstrated ability within information security vulnerability management including the remediation process to address Operating System (Linux/Unix) vulnerabilities and misconfigurations.
Experience with Kubernetes environments that include building, deploying, and supporting containerized images in Cloud environments.
Experience with continuous delivery and integration (CI/CD) in Cloud and infrastructure engineering, and related tools (Jenkins/Tekton, GitHub etc.) and experience with programming or scripting languages such as Python/Go, or Bash/PowerShell.
Self-starter with a bias towards action and can thrive in a fast-paced and ambiguous environment
Desired qualifications:
Experience with security vulnerability management tools is a plus (e.g. Tenable, Anchore).
Knowledge of industry standard Risk scoring methodologies (CVSS, EPSS etc.)
Experience with data analytics (querying, analysis, and visualization) solutions (Splunk, Hadoop etc.) is a plus
Experience using ServiceNow, including features (related to Vulnerability Response and Orchestration) within ServiceNow is highly preferred
Greetings from Flexton!
Hope you are doing great today!
One of my clients is looking for SecDevops Engineer:W2@ Remote please share me your updated resume and desire rate for this position.
Job Description:
Key Responsibilities
Conduct vulnerability scans, analyze reports, and validate potential findings; contribute to process improvements; and documentation.
Configure and manage vulnerability scanners for both VM and Container (Kubernetes) environments (Public cloud is ok too, keeping), including their integration into eBayβs software development lifecycle.
Track and guide Vulnerability remediation efforts across the organization. Escalate issues and problems when needed.
Coordinate PCI-DSS vulnerability scans, and support other compliance and risk management activities in Vulnerability Management
Must be able to interface and coordinate work efficiently and effectively with business colleagues and vendors in global locations and time zones
Requirements:
3 to 5 years of demonstrated ability within information security vulnerability management including the remediation process to address Operating System (Linux/Unix) vulnerabilities and misconfigurations.
Experience with Kubernetes environments that include building, deploying, and supporting containerized images in Cloud environments.
Experience with continuous delivery and integration (CI/CD) in Cloud and infrastructure engineering, and related tools (Jenkins/Tekton, GitHub etc.) and experience with programming or scripting languages such as Python/Go, or Bash/PowerShell.
Self-starter with a bias towards action and can thrive in a fast-paced and ambiguous environment
Desired qualifications:
Experience with security vulnerability management tools is a plus (e.g. Tenable, Anchore).
Knowledge of industry standard Risk scoring methodologies (CVSS, EPSS etc.)
Experience with data analytics (querying, analysis, and visualization) solutions (Splunk, Hadoop etc.) is a plus
Experience using ServiceNow, including features (related to Vulnerability Response and Orchestration) within ServiceNow is highly preferred