At a Glance
- Tasks: Build and automate offensive security tools while collaborating with pen testers.
- Company: Join a cutting-edge team in Birmingham focused on innovative security solutions.
- Benefits: Enjoy a fully internal environment with creative freedom and no commercial clients.
- Why this job: Perfect for those wanting to transform pen test tactics into scalable infrastructure.
- Qualifications: Must be skilled in CI/CD, scripting, and have a strong understanding of security tools.
- Other info: Ideal for someone who thinks like an attacker and loves automation.
The predicted salary is between 36000 - 60000 £ per year.
A DevOps engineer who doesn’t just know pipelines and CI/CD, but knows how to weaponise them.
What they’ll realistically be doing:
- Build and automate offensive security tooling
- Work alongside pen testers to turn manual recon/exploitation into slick, scalable pipelines
- Write the glue that binds Burp Suite, Nmap, BloodHound, CrackMapExec, and all the other tools they love (or build their own)
- Think like an attacker, and script like a builder
- Fully internal environment, no commercial clients, they get free reign to build and automate as they please
We’re not looking for a checkbox DevSecOps person. We’re looking for someone who reads logs like a story, speaks YAML like a second language, and sees CI/CD as a delivery mechanism for payloads, not just code.
If they’ve ever wanted to turn pen test tactics into reliable, repeatable infrastructure, this is for them.
DevSecOps Engineer in Birmingham employer: FBI &TMT
Contact Detail:
FBI &TMT Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land DevSecOps Engineer in Birmingham
✨Tip Number 1
Familiarise yourself with the specific tools mentioned in the job description, like Burp Suite and Nmap. Having hands-on experience with these tools will not only boost your confidence but also demonstrate your practical knowledge during discussions.
✨Tip Number 2
Showcase your ability to think like an attacker by discussing any personal projects or experiences where you’ve applied offensive security techniques. This will help you stand out as someone who truly understands the mindset required for the role.
✨Tip Number 3
Prepare to discuss how you've automated processes in previous roles. Be ready to share specific examples of how you’ve built CI/CD pipelines that enhance security, as this aligns perfectly with what we’re looking for.
✨Tip Number 4
Engage with the DevSecOps community online. Join forums or social media groups where you can learn from others and share your insights. This not only expands your network but also keeps you updated on the latest trends and best practices in the field.
We think you need these skills to ace DevSecOps Engineer in Birmingham
Some tips for your application 🫡
Understand the Role: Before applying, make sure you fully understand what a DevSecOps Engineer does, especially in the context of offensive security. Familiarise yourself with the tools mentioned in the job description and think about how your experience aligns with their needs.
Tailor Your CV: Highlight relevant experience that showcases your skills in building and automating security tooling. Include specific examples of projects where you've worked with CI/CD pipelines and any offensive security work you've done.
Craft a Compelling Cover Letter: Use your cover letter to tell a story about your passion for DevSecOps. Explain how you think like an attacker and provide examples of how you've turned manual processes into automated solutions. Make it personal and engaging.
Showcase Your Technical Skills: In your application, emphasise your scripting abilities and familiarity with tools like Burp Suite, Nmap, and others mentioned. If you've built your own tools or scripts, mention them to demonstrate your hands-on experience.
How to prepare for a job interview at FBI &TMT
✨Showcase Your Technical Skills
Be prepared to discuss your experience with CI/CD pipelines and how you've automated security tooling in the past. Highlight specific projects where you’ve integrated tools like Burp Suite or Nmap into your workflows.
✨Think Like an Attacker
Demonstrate your understanding of offensive security by discussing how you approach problem-solving from an attacker's perspective. Share examples of how you've turned manual processes into automated solutions.
✨Speak Their Language
Familiarise yourself with the terminology and tools mentioned in the job description. Being able to fluently discuss YAML, scripting, and the tools used in penetration testing will show that you’re a good fit for their team.
✨Ask Insightful Questions
Prepare thoughtful questions about the company's internal environment and their approach to DevSecOps. This shows your genuine interest in the role and helps you gauge if it’s the right fit for you.