

Coltech
Secure Developer
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Secure Developer focused on Linux and container hardening, requiring active UK SC Clearance. Key skills include Linux systems engineering, Docker security, scripting (Python/Bash), and infrastructure automation. Contract length and pay rate are competitive. Hybrid work location.
π - Country
United Kingdom
π± - Currency
Β£ GBP
-
π° - Day rate
Unknown
-
ποΈ - Date
May 23, 2026
π - Duration
Unknown
-
ποΈ - Location
Hybrid
-
π - Contract
Unknown
-
π - Security
Yes
-
π - Location detailed
Romsey, England, United Kingdom
-
π§ - Skills detailed
#Scripting #Automation #Logging #Bash #Monitoring #Linux #Python #Base #Cloud #Azure #Kubernetes #Docker #DevSecOps #Containers #GCP (Google Cloud Platform) #Terraform #Security #Compliance #AWS (Amazon Web Services) #Ansible
Role description
Secure Developer (Linux / Container Hardening)
Hybrid / UK-Based
Competitive Day Rate / Salary
Security Clearance Required (SC or higher preferred)
Overview
We are seeking a Secure Developer to design and implement advanced endpoint and runtime protection controls for critical software environments. This role focuses on Linux hardening, container security, and low-level system telemetry, helping reduce risk across core application and infrastructure layers.
You will work at the intersection of systems engineering, security, and DevSecOps, building robust protections directly into Ubuntu hosts and Docker environments, and integrating security telemetry into early-stage SIEM and detection pipelines.
This is a hands-on engineering role requiring deep understanding of Linux internals, container runtimes, and security hardening standards.
Key Responsibilities
β’ Harden Ubuntu Linux hosts at kernel and OS level using:
β’ sysctl tuning
β’ namespaces
β’ AppArmor
β’ seccomp
β’ Linux capabilities
β’ Implement and maintain auditd rules, syscall-level logging, and host/container telemetry for detection, monitoring, and forensic analysis
β’ Apply and enforce CIS Benchmarks (Level 2) for:
β’ Ubuntu Linux
β’ Docker containers and runtime environments
β’ Hardened base image standards and secure configuration baselines
β’ Secure Docker runtime environments through:
β’ least-privilege execution models
β’ container isolation strategies
β’ image provenance and signing
β’ Docker daemon hardening
β’ Develop EDR-style capabilities using:
β’ kernel-level telemetry
β’ runtime behaviour monitoring
β’ host-based detection logic
β’ Integrate host and container logs into prototype SIEM pipelines, enabling correlation and early threat detection
β’ Automate security controls, hardening processes, and compliance checks using:
β’ scripting (Python / Bash)
β’ infrastructure-as-code tools (Terraform / Ansible preferred)
Required Experience
β’ Strong experience with Linux systems engineering (Ubuntu preferred)
β’ Deep understanding of Linux kernel security controls and namespaces
β’ Hands-on experience with Docker container security and runtime hardening
β’ Experience implementing auditd, syscall monitoring, or host-based telemetry systems
β’ Familiarity with CIS Benchmarks and secure configuration management
β’ Strong scripting ability (Python, Bash, or similar)
β’ Experience with infrastructure automation tools (Ansible, Terraform, or similar)
β’ Understanding of endpoint security, runtime security, or EDR concepts
Desirable Experience
β’ Experience building or integrating SIEM solutions or security pipelines
β’ Knowledge of eBPF-based monitoring or kernel instrumentation
β’ Exposure to Kubernetes security hardening (optional but beneficial)
β’ Experience in secure software development or DevSecOps environments
β’ Familiarity with cloud security controls (AWS / Azure / GCP)
β’ Experience working in defence, government, or highly regulated environments
Clearance Requirement
Applicants must hold active UK SC Clearance (or higher) due to the sensitive nature of the environment.
Whatβs on Offer
β’ Opportunity to build real-world endpoint security and runtime protection systems
β’ Work on low-level Linux security engineering and container hardening
β’ High-impact role improving resilience of core enterprise software
β’ Exposure to advanced security engineering and prototype SIEM development
β’ Collaborative engineering environment focused on security-by-design
Secure Developer (Linux / Container Hardening)
Hybrid / UK-Based
Competitive Day Rate / Salary
Security Clearance Required (SC or higher preferred)
Overview
We are seeking a Secure Developer to design and implement advanced endpoint and runtime protection controls for critical software environments. This role focuses on Linux hardening, container security, and low-level system telemetry, helping reduce risk across core application and infrastructure layers.
You will work at the intersection of systems engineering, security, and DevSecOps, building robust protections directly into Ubuntu hosts and Docker environments, and integrating security telemetry into early-stage SIEM and detection pipelines.
This is a hands-on engineering role requiring deep understanding of Linux internals, container runtimes, and security hardening standards.
Key Responsibilities
β’ Harden Ubuntu Linux hosts at kernel and OS level using:
β’ sysctl tuning
β’ namespaces
β’ AppArmor
β’ seccomp
β’ Linux capabilities
β’ Implement and maintain auditd rules, syscall-level logging, and host/container telemetry for detection, monitoring, and forensic analysis
β’ Apply and enforce CIS Benchmarks (Level 2) for:
β’ Ubuntu Linux
β’ Docker containers and runtime environments
β’ Hardened base image standards and secure configuration baselines
β’ Secure Docker runtime environments through:
β’ least-privilege execution models
β’ container isolation strategies
β’ image provenance and signing
β’ Docker daemon hardening
β’ Develop EDR-style capabilities using:
β’ kernel-level telemetry
β’ runtime behaviour monitoring
β’ host-based detection logic
β’ Integrate host and container logs into prototype SIEM pipelines, enabling correlation and early threat detection
β’ Automate security controls, hardening processes, and compliance checks using:
β’ scripting (Python / Bash)
β’ infrastructure-as-code tools (Terraform / Ansible preferred)
Required Experience
β’ Strong experience with Linux systems engineering (Ubuntu preferred)
β’ Deep understanding of Linux kernel security controls and namespaces
β’ Hands-on experience with Docker container security and runtime hardening
β’ Experience implementing auditd, syscall monitoring, or host-based telemetry systems
β’ Familiarity with CIS Benchmarks and secure configuration management
β’ Strong scripting ability (Python, Bash, or similar)
β’ Experience with infrastructure automation tools (Ansible, Terraform, or similar)
β’ Understanding of endpoint security, runtime security, or EDR concepts
Desirable Experience
β’ Experience building or integrating SIEM solutions or security pipelines
β’ Knowledge of eBPF-based monitoring or kernel instrumentation
β’ Exposure to Kubernetes security hardening (optional but beneficial)
β’ Experience in secure software development or DevSecOps environments
β’ Familiarity with cloud security controls (AWS / Azure / GCP)
β’ Experience working in defence, government, or highly regulated environments
Clearance Requirement
Applicants must hold active UK SC Clearance (or higher) due to the sensitive nature of the environment.
Whatβs on Offer
β’ Opportunity to build real-world endpoint security and runtime protection systems
β’ Work on low-level Linux security engineering and container hardening
β’ High-impact role improving resilience of core enterprise software
β’ Exposure to advanced security engineering and prototype SIEM development
β’ Collaborative engineering environment focused on security-by-design






