Devsec Ops Engineer

Anduril Anduril · Defense · Fort Collins, CO · Mission Systems : Battlespace Awareness Engineering

Anduril Industries is a defense technology company developing AI-powered systems for military applications. This DevSecOps Engineer role focuses on building and maintaining secure automation infrastructure for radar tracking deployments, ensuring compliance with stringent DoD security requirements. Responsibilities include designing CI/CD pipelines, implementing Infrastructure-as-Code, automating security compliance, and supporting developer workflows in classified environments.

What you'd actually do

  1. Design and implement secure CI/CD pipelines for classified environments, enabling automated build, test, and deployment of radar tracking software across multiple enclaves
  2. Build Infrastructure-as-Code frameworks (Terraform, Ansible, or similar) to provision and configure development, test, and production environments that meet DISA STIG and NIST 800-53 requirements
  3. Automate security compliance workflows, including STIG scanning, vulnerability assessment, configuration validation, and compliance reporting for continuous monitoring
  4. Develop containerization and orchestration solutions (Docker, Kubernetes) tailored for classified networks with appropriate security hardening
  5. Implement secrets management, certificate rotation, and access control systems that balance security with developer productivity

Skills

Required

  • CI/CD tools (GitLab CI, Jenkins, GitHub Actions)
  • Infrastructure-as-Code (Terraform, Ansible, Puppet, Chef)
  • Containerization (Docker)
  • Orchestration platforms (Kubernetes, Docker Swarm)
  • Linux system administration
  • Networking
  • Scripting (Python, Bash)
  • DoD security frameworks (RMF, NIST 800-53, DISA STIGs)

Nice to have

  • Deploying and maintaining systems in classified DoD or IC environments
  • ATO processes
  • STIG implementation
  • continuous monitoring for accredited systems
  • Python package development
  • SCAP-compliant scanning tools (OpenSCAP, Nessus, ACAS)
  • automated compliance frameworks
  • secure software supply chain practices
  • artifact signing
  • software bill of materials (SBOM)
  • zero-trust architectures
  • microsegmentation in Kubernetes environments
  • GitOps workflows
  • declarative infrastructure management
  • observability and monitoring tools (Prometheus, Grafana, ELK stack, Splunk)
  • PKI
  • certificate management
  • secrets management solutions (Vault, AWS Secrets Manager)
  • air-gapped or disconnected network deployments
  • real-time or embedded systems
  • Active U.S. Top Secret SCI clearance
  • Security+ certification
  • CISSP certification
  • AWS/Azure security certifications

What the JD emphasized

  • stringent DoD and IC security requirements
  • DISA STIG and NIST 800-53 requirements
  • DoD security frameworks (RMF, NIST 800-53, DISA STIGs)
  • classified environments
  • classified networks
  • U.S. Top Secret SCI security clearance
  • classified DoD or IC environments
  • ATO processes
  • STIG implementation
  • air-gapped or disconnected network deployments