DevSecOps

5 - 6 years

3 - 12 Lacs

Posted:2 days ago| Platform: Foundit logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

  1. Compliance and Governance
  • Compliance Standards:
  • Ensure adherence to GDPR, HIPAA, PCI DSS, and other standards.
  • Maintain audit trails with AWS CloudTrail and Bitbucket Activity Logs.
  1. Vulnerability Assessment, Penetration Testing (VAPT), and Hardening
  • Assessments: Perform regular vulnerability assessments on AWS resources using tools like AWS Inspector, Nessus, or Qualys.
  • Service Hardening: Apply AWS best practices to secure services like EC2, RDS, and S3.
  • Encryption: Implement encryption in transit and at rest using AWS KMS and SSL/TLS.
  1. Infrastructure Security

Cloud Security:

  • Use AWS services (Security Hub, GuardDuty, CloudTrail) and GCP tools (Security Command Center, IAM) to harden cloud environments.
  • Automate infrastructure deployment with Terraform or AWS CloudFormation, ensuring security best practices.
  • Scan IaC using Checkov, Terrascan, or AWS Config Rules.
  1. Application Security
  • SAST and DAST:
  • Perform SAST during development to identify vulnerabilities early.
  • Conduct DAST in staging or production using tools like Burp Suite, OWASP ZAP, or AppScan.
  • Android Security:
  • Test Android apps using tools like MobSF, QARK, or Drozer.
  • Ensure compliance with OWASP MSTG standards.
  1. Ethical Hacking and Ransomware Testing
  • Ransomware Simulation: Simulate ransomware attacks to test recovery capabilities and data resiliency.
  • Ethical Hacking: Perform ethical hacking exercises to assess system vulnerabilities and identify potential breaches
  1. Threat Analysis Threat Modeling:
  • Conduct regular threat analysis to evaluate potential risks to cloud infrastructure and applications.
  • Create and maintain threat models for applications, services, and infrastructure to identify attack vectors and mitigation strategies.
  • Use tools like Microsoft Threat Modeling Tool, OWASP Threat Dragon, or custom modeling techniques to identify and prioritize risks.
  1. Code Scanning:
  • Use Bitbucket Code Insights for integrated security scan results in PRs.
  • Monitor repositories for exposed credentials or sensitive data.
  • Automate IaC scanning with tools like Checkov.
  1. CI/CD and Code Security
  • Secure Pipelines:
  • Integrate Bitbucket Pipelines with AWS services for secure deployments.
  • Automate security checks at each pipeline stage:
  • SAST (Static Application Security Testing): Use tools like SonarQube.
  • DAST (Dynamic Application Security Testing): Use tools like OWASP ZAP or Burp Suite.
  • Dependency scanning using tools like OWASP Dependency-Check.
  • Container security scanning for Docker images.
  1. Code Scanning:
  • Use Bitbucket Code Insights for integrated security scan results in PRs.
  • Monitor repositories for exposed credentials or sensitive data.
  • Automate IaC scanning with tools like Checkov.
  1. WSO2 API Manager Responsibilities
  • API Security:
  • Secure APIs with OAuth2, JWT tokens, and mutual TLS.
  • Implement rate-limiting and throttling to prevent abuse.
  • Integrate APIs with AWS Cognito or other identity providers for authentica
  1. Monitoring and Incident Response
  • Monitoring:
  • Use AWS CloudWatch, GuardDuty, and Bitbucket monitoring features.
  • Configure proactive alerts using PagerDuty or Slack for Bitbucket Pipelines.
  • Incident Response:
  • Automate incident response workflows using AWS Systems Manager or AWS Lambda.
  • Conduct regular incident response drills.
  1. AWS IAM (Identity and Access Management)
  • Policy Design: Create and enforce least privilege access policies.
  • Audits: Conduct regular audits of IAM roles, groups, and policies to ensure compliance and security.
  • Federated Identity: Configure and manage federated identity with external IdPs (e.g., Okta, Azure AD).
  1. Bitbucket Roles and Responsibilities
  • Version Control Security:
  • Manage repository access using roles (Admin, Developer, Read-Only).
  • Enforce branch protection rules for PR reviews.
  • Secure sensitive data using Bitbucket Pipelines environment variables.
  • CI/CD Pipeline Integration:
  • Integrate Bitbucket Pipelines with security tools like SonarQube or Checkmarx.
  • Automate dependency vulnerability checks.
  • Use pre-commit hooks for code quality and security validation.

Job Requirement

Key Tools and Technologies

Category

Tools

Compliance and Governance

GDPR, HIPAA, PCI DSS / AWS CloudTrail and Bitbucket Activity Logs

Vulnerability Assessment, Penetration Testing (VAPT), and Hardening

VAPT

Infrastructure Security

AWS services

Application Security

SAST / DAST

Ethical Hacking and Ransomware Testing

ransomware attacks / system vulnerabilities

Threat Analysis Threat Modeling

applications, services, and infrastructure

Code Scanning

SonarQube, Checkmarx, OWASP ZAP

Source Control

Bitbucket, Git

CI/CD

Bitbucket Pipelines, Jenkins, GitLab CI/CD

Cloud Security

AWS Security Hub, GuardDuty, GCP Security

API Management

WSO2 API Manager, AWS API Gateway

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

mumbai, maharashtra, india

Bengaluru / Bangalore, Karnataka, India

New Delhi, Delhi, India

Pune, Maharashtra, India