JobDescription.org

Information Technology

DevSecOps IT Service Management (ITSM) Security Engineer

Last updated

DevSecOps IT Service Management (ITSM) Security Engineers embed security controls directly into software delivery pipelines while ensuring those pipelines align with ITSM frameworks like ITIL — change management, incident response, and service continuity. They sit at the intersection of development velocity and governance, translating security policy into automated gates that teams can't route around and that auditors can actually verify.

Role at a glance

Typical education
Bachelor's in CS, Information Systems, or Cybersecurity; Associate's or Bootcamp with strong portfolio also considered
Typical experience
Not specified; requires proficiency in CI/CD, security tooling, and ITSM platforms
Key certifications
ITIL 4 Foundation, CISSP, CISM, AWS Security Specialty, CKS
Top employer types
Enterprise SaaS, Federal contractors, Regulated industries, Cloud service providers
Growth outlook
Rising demand driven by regulatory pressure (SBOM, CISA guidance) and software supply chain security needs
AI impact (through 2030)
Strong tailwind — increasing volume of AI-generated code expands the need for automated security gates and automated vulnerability screening within the pipeline.

Duties and responsibilities

  • Design and enforce security gates within CI/CD pipelines using SAST, DAST, SCA, and container scanning tools
  • Integrate security findings into ITSM ticketing workflows so vulnerabilities surface as change or incident records with defined SLAs
  • Develop and maintain Infrastructure-as-Code security policies using tools like OPA, Checkov, or Sentinel across Terraform and Kubernetes deployments
  • Collaborate with change advisory board (CAB) processes to define security acceptance criteria for production deployments
  • Build automated compliance checks that map pipeline controls to NIST 800-53, SOC 2, or ISO 27001 control families
  • Triage and route pipeline security alerts to appropriate development teams, tracking remediation through ServiceNow or Jira Service Management
  • Conduct threat modeling sessions during sprint planning to identify attack surfaces before code is written
  • Maintain and tune SIEM integrations that ingest pipeline and ITSM event data for anomaly detection and audit reporting
  • Define and test disaster recovery and business continuity procedures for CI/CD toolchain components classified as critical services
  • Mentor development and operations staff on secure coding practices, secrets management, and ITSM security policy compliance

Overview

DevSecOps ITSM Security Engineers solve a problem that most organizations discover the hard way: security reviews and change management processes that live outside the development workflow do not scale. As deployment frequency increases from quarterly releases to dozens of deployments per day, manual security sign-off and informal change management become the bottleneck — or worse, teams route around them entirely.

This role addresses that by making security and governance native to the pipeline. On the DevSecOps side, that means configuring tools like Snyk, Semgrep, Trivy, or Veracode to run automatically on every commit, pull request, and container build. It means writing the policy-as-code that decides which findings block a deployment and which generate a ticket for later remediation. It means owning the secrets management configuration in HashiCorp Vault or AWS Secrets Manager so that credentials never appear in source code — and alerting when they do.

On the ITSM side, the job is about closing the loop between pipeline events and governance records. When a critical vulnerability is detected in a production container image, that finding needs to become an incident record in ServiceNow with an SLA attached — not just a Slack message that gets lost. When a pipeline change modifies a security-relevant configuration, it needs a change request that goes through CAB review, not a direct commit to main. This engineer designs those integrations and keeps them working as both the pipeline toolchain and the ITSM platform evolve.

The day-to-day work is genuinely cross-functional. In the morning, this engineer might be in a sprint planning session helping a development team threat-model a new API. After lunch, they're reviewing a change request for a Terraform module update that touches IAM permissions. By end of day, they're tuning a SIEM correlation rule that's generating false positives from the deployment pipeline. The ability to context-switch across developer toolchains, security concepts, and governance processes — and to explain each domain to people fluent in the others — is the core skill.

In regulated industries, this role also carries a compliance accountability that pure DevOps engineers typically avoid. Evidence that security controls ran on a specific build, that a specific change was reviewed and approved, and that a specific vulnerability was remediated within SLA is what audit teams ask for. Building the systems that produce that evidence automatically — rather than scrambling to reconstruct it before an audit — is where the real value of this position lives.

Qualifications

Education:

  • Bachelor's in computer science, information systems, or cybersecurity (common; not universally required)
  • Candidates with associate degrees or bootcamp backgrounds are competitive if their GitHub and home lab history demonstrates hands-on pipeline and security work
  • Master's in cybersecurity or information assurance valued for roles with significant governance scope

Certifications (in rough priority order):

  • ITIL 4 Foundation or Managing Professional — ITSM credibility that most pure security engineers lack
  • CISSP or CISM — signals security program governance understanding
  • AWS Security Specialty, GCP Professional Cloud Security Engineer, or Azure Security Engineer Associate — platform depth
  • Certified Kubernetes Security Specialist (CKS) — container environment security
  • GIAC GDEV (DevSecOps) — emerging but increasingly recognized
  • DoD 8570/8140: Security+, CASP+ for defense and federal work

Technical skills:

  • CI/CD platforms: Jenkins, GitHub Actions, GitLab CI, CircleCI, Azure DevOps
  • Security tooling: SAST (Semgrep, Checkmarx, Sonarqube), DAST (OWASP ZAP, Burp Suite Enterprise), SCA (Snyk, FOSSA, Dependabot), container scanning (Trivy, Grype, Anchore)
  • IaC and policy-as-code: Terraform, Ansible, Pulumi; OPA/Rego, Checkov, tfsec
  • ITSM platforms: ServiceNow (Security Operations module fluency is a differentiator), Jira Service Management
  • Secrets management: HashiCorp Vault, AWS Secrets Manager, Azure Key Vault
  • SIEM/observability: Splunk, Elastic Security, Datadog, Sumo Logic
  • Container orchestration: Kubernetes RBAC, admission controllers, network policies, image signing with Cosign/Sigstore

Frameworks and standards:

  • ITIL 4 service management lifecycle
  • NIST 800-53 and 800-218 (Secure Software Development Framework)
  • CIS Benchmarks for cloud and container workloads
  • SOC 2 Type II, ISO 27001, FedRAMP (sector-dependent)

Soft skills that separate strong candidates:

  • Ability to translate security findings into developer-facing language without condescension
  • Persistence in getting ITSM processes adopted by teams that view them as overhead
  • Documentation discipline — audit evidence doesn't write itself

Career outlook

Demand for engineers who can combine pipeline security with enterprise governance has been rising faster than supply for the better part of five years, and the gap is not closing quickly. Organizations have invested heavily in both DevOps toolchains and ITSM platforms, but the people who understand both well enough to integrate them securely are genuinely scarce.

Several forces are sustaining that demand heading into 2026.

Regulatory pressure: The 2021 Executive Order on cybersecurity and subsequent CISA guidance pushed federal agencies and their contractors toward software bill of materials (SBOM) requirements, secure development attestations, and pipeline integrity verification. SOC 2 Type II and ISO 27001 are now standard requirements for enterprise SaaS vendors, and auditors have gotten more specific about what automated evidence they expect. That specificity translates directly into headcount demand for engineers who can build the systems that produce the evidence.

Supply chain security incidents: High-profile software supply chain compromises have made board-level awareness of pipeline security real in a way it wasn't five years ago. Security leaders who previously struggled to get budget for SAST tooling and pipeline controls now have executive backing — and need engineers to implement and operate them.

AI code generation volume: As development teams adopt AI code assistants, the volume of code entering pipelines is increasing substantially. More code means more potential vulnerabilities, and the appetite for automated security gates that can screen AI-generated code at scale is creating new demand for toolchain engineers who understand what those gates can and cannot catch.

Career trajectory: This role is a strong platform for advancement. Common next steps include Principal Security Engineer, AppSec Program Lead, or Director of DevSecOps — roles that carry $160K–$220K+ total compensation at mid-to-large enterprises. Some engineers move laterally into cloud security architecture or security program management roles. The ITSM depth also opens doors into IT governance and GRC leadership tracks that pure AppSec engineers typically cannot access.

The role is remote-friendly relative to operational security jobs that require on-site hardware access, which expands the candidate market — but also means competition for strong positions is national rather than local. Engineers who hold both technical depth and ITSM certification are in the strongest negotiating position.

Sample cover letter

Dear Hiring Manager,

I'm applying for the DevSecOps ITSM Security Engineer role at [Company]. I've spent the past four years building and operating pipeline security programs — first at a mid-size fintech, currently at [Company], where I own the security toolchain for a platform that runs 80+ deployments per day across three cloud environments.

The work I'm most proud of is a project I built from scratch last year: a bidirectional integration between our GitHub Actions pipelines and ServiceNow Security Operations. When a critical or high Snyk finding appears in a pull request, the pipeline now auto-creates a ServiceNow vulnerability record tied to the service CI item, assigns it to the owning team based on CMDB data, and enforces a 14-day remediation SLA before the affected image can be promoted to production. Before that system existed, critical findings were sitting in Slack threads for weeks. After the first quarter of operation, our mean-time-to-remediate on critical vulns dropped from 31 days to 9.

On the governance side, I've been the technical lead for two SOC 2 Type II audits. Both times, the auditors' pipeline security control testing was straightforward because we had structured evidence — OPA policy evaluation logs, signed attestations from Cosign, ITSM change records linked to deployment IDs. No manual evidence reconstruction.

I'm ITIL 4 Foundation certified and currently studying for CKS. I'd welcome the chance to talk about how this background maps to what your team is building.

[Your Name]

Frequently asked questions

What is the difference between a DevSecOps engineer and a traditional application security engineer?
A traditional AppSec engineer typically reviews code and conducts penetration tests outside the development workflow — findings land in a report that developers may or may not act on quickly. A DevSecOps engineer bakes the same checks into the pipeline as automated gates, so a failing SAST scan blocks a merge request the same way a failing unit test does. The ITSM layer adds formal change and incident records that create audit trails and enforce remediation SLAs.
Why does this role specifically combine DevSecOps with ITSM?
Enterprise environments — especially in financial services, healthcare, and government — require every production change to move through formal ITSM processes: change requests, approvals, and post-implementation reviews. DevSecOps practitioners who ignore ITSM create shadow pipelines that bypass governance; engineers who only know ITSM slow delivery to a crawl. This hybrid role exists to make both systems work together rather than against each other.
What certifications are most relevant for this position?
CISSP and CISM signal broad security governance depth. ITIL 4 Foundation or Managing Professional demonstrates ITSM fluency employers can't assume. Certified Kubernetes Security Specialist (CKS) and AWS Security Specialty cover the platform side. For government and defense work, Security+ or CASP+ satisfy DoD 8570/8140 baseline requirements.
How is AI changing the work of a DevSecOps ITSM Security Engineer?
AI-assisted code generation tools like GitHub Copilot and Amazon CodeWhisperer are accelerating the rate at which new code — including insecure code — enters pipelines. This is increasing the volume of SAST and SCA findings teams need to triage, and it's pushing demand toward engineers who can tune ML-based triage tools to surface real risks rather than noise. On the ITSM side, AI is beginning to auto-classify incidents and suggest remediation steps, but human review of security-related tickets remains standard practice.
Is a software development background required, or can security professionals transition into this role?
Both paths work, but pure security professionals without pipeline experience face a steeper transition. Employers consistently want candidates who can read and write basic pipeline configuration files (Jenkinsfile, GitHub Actions YAML, GitLab CI), understand containerization well enough to write a secure Dockerfile, and navigate an IaC codebase. Security professionals who invest 6–12 months in hands-on lab work with these tools are competitive; those who cannot demonstrate it in a technical screen are not.
See all Information Technology jobs →