DevOps Security Engineer

DevOps Security Engineer

Full-Time 48000 - 84000 £ / year (est.) No home office possible
Go Premium
Blockdaemon

At a Glance

  • Tasks: Secure our software delivery lifecycle and automate security processes.
  • Company: Join Blockdaemon, a leader in blockchain infrastructure solutions.
  • Benefits: Competitive salary, remote work, and opportunities for professional growth.
  • Why this job: Make a real impact on security in the fast-paced blockchain industry.
  • Qualifications: 3-5 years in DevOps/Security roles with hands-on experience.
  • Other info: Be part of a globally distributed team with a collaborative culture.

The predicted salary is between 48000 - 84000 £ per year.

We are looking for a hands-on DevOps Security Engineer who will help secure our posture throughout the software delivery lifecycle — from the first line of code to production deployment and beyond. Our stack is complex. We ship frequently across multiple services running on containerized, cloud-native infrastructure managed entirely as code. Every release needs to be hardened before it reaches customers, and every pipeline needs to enforce that standard automatically. Your job is to make sure that happens — and to build the systems that make it repeatable, auditable, and fast.

Vulnerability Analysis & Release Security

  • Conduct deep-dive vulnerability and security reviews of all software releases before they reach production. This includes manual code review of high-risk changes alongside automated scanning output triage.
  • Own the pre-shipment security gate process: define pass/fail criteria, enforce them in CI/CD, and be the escalation point when a release is blocked on a security finding.
  • Triage and classify vulnerabilities from SAST, DAST, SCA, and container scanning tools. Distinguish real risk from noise, prioritise remediation, and work directly with engineering teams to drive fixes — or write the patches yourself.
  • Maintain and continuously improve a vulnerability management program with clear SLAs for remediation by severity.

Pipeline & Automation Engineering

  • Own and continuously improve the automated security tooling already integrated into our CI/CD pipelines. This means tuning rule sets to reduce false positives, expanding coverage as the stack evolves, optimising scan performance so pipelines stay fast, and ensuring engineers trust the results enough to act on them without escalation.
  • Build and maintain custom security automation — policy-as-code enforcement, secrets detection, dependency vulnerability scanning, image signing and verification — using Python, Go, or Bash.
  • Develop and operate security-focused pipeline stages: static analysis, software composition analysis, dynamic testing against staging environments, infrastructure-as-code validation, and container image scanning.
  • Automate the boring parts. If a security fix can be scripted and applied at scale across repositories, you write that script.

Infrastructure & Cloud Security

  • Audit the full infrastructure-as-code (IaC) stack — Terraform, CloudFormation, Helm charts, Kubernetes manifests — for misconfigurations, policy violations, and drift from security baselines.
  • Define and enforce cloud security policies across AWS, Azure, or GCP environments using tools like Open Policy Agent (OPA), Checkov, tfsec, or equivalent.
  • Harden container orchestration environments: RBAC policies, network policies, pod security standards, runtime threat detection, and supply chain integrity for container images.
  • Collaborate with platform/infrastructure teams to ensure logging, monitoring, and alerting are sufficient for incident detection and forensic investigation.

Security Culture & Shift-Left Enablement

  • Be the engineering team's security partner, not their bottleneck. Provide developers with self-service tooling, clear documentation, and fast feedback loops so they can catch and fix issues before code review.
  • Build and maintain internal security guardrails: pre-commit hooks, IDE integrations, approved base images, hardened CI templates, and reusable secure-by-default modules.
  • Run targeted threat modelling sessions for high-risk features and architectural changes.
  • Contribute to internal security standards, runbooks, and incident response playbooks rooted in real-world scenarios from your own findings.

Role Requirements

  • 3–5+ years in a combined DevOps / Security Engineering / DevSecOps role where you were building and operating, not just recommending.
  • CI/CD pipeline engineering: Deep, hands-on experience with at least one of Jenkins, GitLab CI, or GitHub Actions — including writing custom plugins, shared libraries, or reusable workflow templates.
  • Security tooling integration: Production experience implementing and tuning SAST (e.g., SonarQube, Semgrep, CodeQL), DAST (e.g., OWASP ZAP, Burp Suite), and SCA (e.g., Snyk, Dependabot, Grype) tools within automated pipelines.
  • Cloud security: Proven ability to secure production workloads on at least one major cloud provider (AWS, Azure, or GCP). You understand IAM policies, network segmentation, encryption-at-rest/in-transit, and cloud-native security services at an implementation level — not just a whiteboard level.
  • Container & orchestration security: Hands-on experience securing Docker and Kubernetes environments — image scanning, runtime security (Falco, Sysdig, or similar), admission controllers, network policies, and supply chain security (signing, SBOMs).
  • Infrastructure as Code: Proficiency with Terraform, CloudFormation, or Pulumi, combined with experience auditing IaC for security misconfigurations using policy-as-code frameworks (OPA/Rego, Sentinel, Checkov).
  • Scripting & automation: Strong coding ability in Python, Go, or Bash — sufficient to build custom tooling, write security automation, and contribute patches to application code when needed.
  • Vulnerability management: Experience running or significantly contributing to a vulnerability management program — triage, SLA enforcement, risk-based prioritisation, and metrics reporting.
  • Solid fundamentals: Strong understanding of OWASP Top 10, CWE/CVE ecosystems, secrets management (Vault, AWS Secrets Manager), TLS/mTLS, and common attack vectors against web applications and APIs.

Nice To Have Skills

  • Experience with compliance-as-code frameworks and automating evidence collection for SOC 2, ISO 27001, FedRAMP, or PCI-DSS audits.
  • Familiarity with eBPF-based security observability tools or kernel-level runtime security.
  • Background in penetration testing or red team exercises, particularly against cloud-native infrastructure.
  • Experience building or operating a software supply chain security program (SLSA framework, Sigstore/Cosign, in-toto attestations, SBOM generation and consumption).
  • Knowledge of GitOps workflows (ArgoCD, Flux) and securing the GitOps delivery model.
  • Contributions to open-source security tooling or published security research.
  • Relevant certifications such as CKS (Certified Kubernetes Security Specialist), AWS Security Specialty, OSCP, or GIAC certifications — valued as evidence of depth, not as a checkbox.

This role is for someone who thinks in terms of attack surfaces and blast radius, who automates by instinct, and who measures their success by the security issues that never make it to production. If your idea of a good day is shipping a pipeline change that eliminates an entire class of vulnerability across every repo in the organisation — we want to talk to you.

About Us

We Power the Blockchain economy. Blockdaemon powers the blockchain economy with its suite of industry-leading infrastructure solutions. We are a globally established, ISO-27001 certified partner with extensive protocol coverage, offering technical depth, industry-leading SLAs, 70+ global points of presence through 10+ cloud and bare metal providers, and 24/7 support for an unmatched institutional-grade experience. We provide integrated business solutions to exchanges, custodians, crypto platforms, financial institutions, and developers using our end-to-end suite of blockchain tools, including dedicated nodes, APIs, staking, liquid staking, MPC tech, and more. Blockdaemon provides its customers with the confidence to quickly and easily scale without compromising security or compliance. We are a globally distributed team. Blockdaemon is an Equal Opportunity Employer.

DevOps Security Engineer employer: Blockdaemon

At Blockdaemon, we pride ourselves on being an exceptional employer that fosters a collaborative and innovative work culture. As a DevOps Security Engineer, you will have the opportunity to work with cutting-edge technology in a globally distributed team, while benefiting from our commitment to employee growth through continuous learning and development. With a focus on security and automation, we empower our engineers to take ownership of their work, ensuring that every release is secure and efficient, all within a supportive environment that values diversity and inclusion.
Blockdaemon

Contact Detail:

Blockdaemon Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land DevOps Security Engineer

✨Tip Number 1

Network, network, network! Get out there and connect with folks in the industry. Attend meetups, webinars, or even online forums. The more people you know, the better your chances of landing that DevOps Security Engineer role.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your projects, especially those related to CI/CD pipelines and security automation. This gives potential employers a taste of what you can do and sets you apart from the crowd.

✨Tip Number 3

Don’t just apply for jobs; engage with the companies you’re interested in. Follow them on social media, comment on their posts, and share relevant content. This helps you get noticed and shows your genuine interest in their work.

✨Tip Number 4

Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re proactive and really want to be part of our team at Blockdaemon.

We think you need these skills to ace DevOps Security Engineer

DevOps
Security Engineering
CI/CD Pipeline Engineering
Jenkins
GitLab CI
GitHub Actions
SAST
DAST
SCA
Cloud Security
AWS
Azure
GCP
Container Security
Kubernetes
Docker
Infrastructure as Code
Terraform
CloudFormation
Python
Go
Bash
Vulnerability Management
OWASP Top 10
Secrets Management

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the DevOps Security Engineer role. Highlight your hands-on experience with CI/CD pipelines, security tooling, and cloud security. We want to see how your skills align with our needs!

Showcase Your Projects: Include specific projects where you've implemented security measures or automated processes. We love seeing real-world examples of your work, especially if they relate to vulnerability management or infrastructure as code.

Craft a Compelling Cover Letter: Your cover letter should tell us why you're passionate about security in the DevOps space. Share your thoughts on how you can contribute to our security culture and make an impact from day one!

Apply Through Our Website: Don't forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!

How to prepare for a job interview at Blockdaemon

✨Know Your Stack

Familiarise yourself with the specific technologies mentioned in the job description, like CI/CD tools and cloud providers. Be ready to discuss your hands-on experience with Jenkins, GitLab CI, or GitHub Actions, and how you've integrated security tooling into these pipelines.

✨Showcase Your Automation Skills

Prepare examples of how you've automated security processes in previous roles. Whether it's writing scripts in Python or Go for vulnerability management or creating custom security automation, be ready to explain your thought process and the impact of your work.

✨Understand Vulnerability Management

Brush up on your knowledge of vulnerability management programs. Be prepared to discuss how you've triaged vulnerabilities, enforced SLAs, and prioritised remediation efforts. Highlight any metrics you've tracked to demonstrate your success in this area.

✨Be a Security Partner

Emphasise your ability to collaborate with engineering teams. Share instances where you've provided developers with self-service tools or documentation that helped them catch security issues early. Show that you can be a partner in security, not just a gatekeeper.

DevOps Security Engineer
Blockdaemon
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>