Information Technology
DevSecOps Performance Engineer
Last updated
DevSecOps Performance Engineers sit at the intersection of security, performance engineering, and continuous delivery — embedding security testing and performance validation directly into CI/CD pipelines so vulnerabilities and bottlenecks surface before code reaches production. They own the toolchain that runs SAST, DAST, dependency scanning, and load testing as automated gates, working alongside development, operations, and security teams to ensure releases are fast, safe, and measurable.
Role at a glance
- Typical education
- Bachelor's degree in CS, Software Engineering, or Information Security
- Typical experience
- 4-7 years
- Key certifications
- CKS, OSCP, AWS Security Specialty, GCP Professional Cloud Security Engineer
- Top employer types
- Large technology companies, platform engineering teams, security tooling vendors, cloud-native enterprises
- Growth outlook
- Strong demand driven by supply chain security requirements (SBOMs) and shift-left security maturity.
- AI impact (through 2030)
- Strong tailwind — AI coding assistants accelerate code generation, increasing the volume of code requiring automated security and performance gates, thereby raising the value of engineers who can tune these automated systems.
Duties and responsibilities
- Design and maintain CI/CD pipeline stages that run SAST, DAST, SCA, and container image scanning on every pull request
- Build and execute load, stress, and soak tests using k6, Gatling, or JMeter against staging and pre-production environments
- Define and enforce performance budgets — latency p95/p99, throughput, error rate — as automated pipeline quality gates
- Identify and remediate CVEs in application dependencies, base images, and infrastructure-as-code templates before deployment
- Instrument application and infrastructure telemetry using OpenTelemetry, Prometheus, and distributed tracing to surface performance regressions
- Conduct threat modeling sessions with development teams to identify attack surfaces during architecture and design reviews
- Tune Kubernetes resource quotas, JVM heap settings, and database connection pools to resolve performance bottlenecks found in testing
- Maintain secrets management integrations with HashiCorp Vault or AWS Secrets Manager across all pipeline and runtime environments
- Produce post-incident and post-load-test reports correlating security findings with performance degradation root causes
- Evaluate and onboard new DevSecOps tooling — scanners, chaos engineering platforms, policy-as-code frameworks — through structured proof-of-concept cycles
Overview
DevSecOps Performance Engineers solve a problem that neither pure security engineers nor pure performance engineers can fully own: the interaction between security controls and system performance at every stage of the delivery lifecycle. A WAF rule that adds 40ms of latency per request, a dependency scanner that doubles pipeline duration and gets disabled by developers as a workaround, a TLS configuration that is cryptographically sound but unsuitable for high-frequency API calls — these are the gaps this role exists to close.
On a typical sprint, the work moves between several domains. Pipeline work involves maintaining the security gate stages in GitHub Actions, GitLab CI, or Jenkins: ensuring scanners are up to date, tuning rule sets to reduce false positives that create developer fatigue, and adding new gates as the application surface expands. Performance engineering work involves scripting realistic load profiles against staging environments, profiling results in Grafana or Jaeger, and walking development teams through specific bottlenecks — a slow database query, a thread pool sized for staging load rather than production traffic, a service mesh timeout that causes cascading retries.
The security-performance intersection shows up constantly. Container image hardening changes base image layers and affects startup time. Encrypting internal service-to-service traffic with mTLS adds CPU overhead that matters at scale. Policy-as-code frameworks like OPA/Gatekeeper enforce security posture but add admission control latency to Kubernetes deployments. The DevSecOps Performance Engineer quantifies those tradeoffs and presents them with data rather than opinion.
Incident response is also part of the role. When a production incident has both a security dimension and a performance dimension — a DDoS that exposes a rate-limiting gap, a misconfigured secret that causes authentication retry storms — this is the person coordinating the post-incident analysis across both disciplines.
Team structure varies. At larger organizations this role works within a platform engineering or developer experience team, with close ties to the AppSec and SRE functions. At smaller companies the role is often a solo practitioner who is the primary owner of the full security and performance toolchain.
Qualifications
Education:
- Bachelor's degree in computer science, software engineering, or information security (common, not always required)
- Self-taught engineers with demonstrable open-source tooling contributions or CTF track records are regularly competitive
- Master's in cybersecurity or software engineering for senior and staff roles at large enterprises
Core technical stack:
- CI/CD platforms: GitHub Actions, GitLab CI/CD, Jenkins, CircleCI, Tekton
- Security scanning: Snyk, Semgrep, Checkmarx, Trivy, Grype, OWASP ZAP, Burp Suite Enterprise
- Performance testing: k6, Gatling, JMeter, Locust — with scripting in JavaScript, Scala, or Python
- Observability: Prometheus, Grafana, Datadog, OpenTelemetry SDK instrumentation, Jaeger or Tempo for distributed tracing
- Container and Kubernetes security: Falco, OPA/Gatekeeper, Kyverno, CIS benchmarks, Pod Security Standards
- Secrets management: HashiCorp Vault, AWS Secrets Manager, Azure Key Vault
- Infrastructure-as-code security: Checkov, tfsec, Terrascan against Terraform and Helm charts
Experience benchmarks:
- 4–7 years in software engineering, SRE, or security engineering before moving into a combined role
- Hands-on experience owning a CI/CD pipeline end-to-end — not just contributing to one
- At least one production performance incident investigation with documented root cause and resolution
- Demonstrated AppSec work: penetration test findings, SAST rule authoring, or threat modeling facilitation
Certifications that differentiate:
- OSCP or OSWE (Offensive Security) for security credibility
- CKS for Kubernetes-heavy environments
- AWS Security Specialty or GCP Professional Cloud Security Engineer for cloud-native shops
- GIAC GWAPT or GWEB for web application security depth
Soft skills that matter:
- Communicating security and performance risk to engineering audiences without triggering defensive reactions
- Prioritization discipline — scanners produce enormous finding volumes; deciding what blocks a release vs. what goes in the backlog is a judgment call made daily
- Comfort working without clear boundaries between security, reliability, and performance responsibilities
Career outlook
DevSecOps as a discipline has moved from a trend to a baseline expectation at most technology companies. What is still evolving is the performance dimension of the role. Organizations that adopted shift-left security practices in 2019–2022 are now discovering that security tooling added late in the pipeline adds friction and latency — both to the CI/CD process and, in some cases, to application runtime performance. Engineers who can address both dimensions simultaneously are meaningfully scarce.
Demand signals are strong. The CISA Secure by Design initiative, FedRAMP 20X modernization, and growing contractual pressure from large enterprise customers around software bills of materials (SBOMs) and supply chain security are pushing companies to instrument their pipelines more rigorously. Each of those requirements needs someone who understands both the security control and its operational cost.
The AI coding assistant wave is creating a secondary driver. As tools like Copilot and Cursor accelerate code generation, the volume of code reaching security and performance review gates is increasing faster than the teams reviewing it. Automation quality — the sophistication of automated pipeline gates — becomes more important when human review is the bottleneck. That raises the value of engineers who can build and tune those automated systems.
Cloud-native and Kubernetes-centric architectures remain the primary environment for this work. The shift toward platform engineering teams as a delivery model — rather than embedded DevOps in each product team — is concentrating this skill set into smaller, higher-leverage groups. Staff and principal-level DevSecOps Performance Engineers at large technology companies are often responsible for toolchain decisions that affect dozens of development teams.
Career paths from this role lead in several directions. Some engineers deepen into security architecture or principal AppSec roles. Others move toward SRE management or platform engineering leadership. A growing number move into product roles at the security tooling vendors — Snyk, Wiz, Datadog — where practical pipeline experience is a direct product qualification.
For engineers entering the role in 2026, the combination of cloud security certifications, hands-on Kubernetes experience, and demonstrated load testing work will remain the most direct path to competitive compensation and career progression.
Sample cover letter
Dear Hiring Manager,
I'm applying for the DevSecOps Performance Engineer role at [Company]. For the past five years I've been at [Company], most recently as a senior engineer on the platform team responsible for the security and performance toolchain serving 40+ development squads.
When I joined, security scanning and load testing were separate efforts that rarely talked to each other — SAST ran in a nightly batch job, and performance testing happened manually before major releases. I rebuilt both as continuous pipeline gates in GitHub Actions: Semgrep and Trivy on every pull request, k6 load scenarios against our staging environment on every merge to main, with p99 latency and error rate thresholds as blocking quality gates. Pipeline duration went from 48 minutes to 19 minutes after I profiled and parallelized the scanning stages, which was the difference between developers actually waiting for results and skipping them.
The work I'm most proud of involved our mTLS rollout. The security team needed encrypted service-to-service traffic; the SRE team was concerned about CPU overhead at scale. I ran synthetic load tests at 3x production traffic with and without mTLS enforced, instrumented with OpenTelemetry, and showed that the overhead was 4ms p99 at expected peak load — within our budget. That gave both teams a data-backed decision instead of a standoff.
I hold an active AWS Security Specialty certification and have been working through OSCP prep over the last six months. I'm comfortable in Python, Go, and HCL, and I've run chaos engineering experiments using Chaos Mesh to validate that our circuit breakers and retry logic held up under dependency failure scenarios.
I'd welcome the chance to talk through how that experience maps to what your team is building.
[Your Name]
Frequently asked questions
- What is the difference between a DevSecOps Engineer and a DevSecOps Performance Engineer?
- A standard DevSecOps Engineer focuses primarily on integrating security controls into the delivery pipeline — scanning, policy enforcement, secrets management. A DevSecOps Performance Engineer adds the performance discipline on top: they also own load testing, latency profiling, capacity planning, and the correlation between security controls (like WAF rules or TLS overhead) and application throughput. It is a narrower, more specialized role that is increasingly common at scale.
- Which certifications are most valued in this role?
- Offensive Security certifications (OSCP, OSWE) signal real penetration testing depth and are highly respected by security-conscious hiring teams. On the cloud side, AWS Security Specialty, GCP Professional Cloud Security Engineer, and CKS (Certified Kubernetes Security Specialist) are directly applicable. For performance specifically, there is no dominant industry cert — demonstrated toolchain proficiency with k6, Gatling, and observability platforms carries more weight than any single credential.
- How is AI changing this role?
- AI-assisted code review tools like GitHub Copilot Autofix and Semgrep Assistant are reducing the manual triage burden on SAST findings, surfacing likely false positives and suggesting remediations inline. On the performance side, ML-driven anomaly detection in observability platforms (Datadog Watchdog, Dynatrace Davis) is changing how regressions are surfaced — from threshold-based alerting to dynamic baseline comparison. The practical impact is that engineers spend less time on triage and more time on architecture-level decisions, which raises the skill floor for the role over time.
- Do DevSecOps Performance Engineers need a security clearance?
- Not for most commercial roles, but defense, federal civilian, and intelligence contractor positions frequently require Secret or TS/SCI clearances, and those roles typically pay a meaningful premium over the commercial market. Candidates with active clearances who also hold performance engineering depth are genuinely scarce, which creates significant negotiating leverage.
- What programming languages are expected at this level?
- Python is nearly universal — for scripting pipeline integrations, writing custom scanners, and building load test scenarios. Go is increasingly relevant for tooling and Kubernetes operator development. Bash and HCL (Terraform) are daily-use languages for infrastructure automation. Familiarity with at least one compiled language (Java, Go, or C#) is valuable for profiling JVM or runtime performance issues in application code.
More in Information Technology
See all Information Technology jobs →- DevSecOps Orchestration Engineer$115K–$185K
DevSecOps Orchestration Engineers design, build, and maintain the automated security controls woven into CI/CD pipelines, container platforms, and cloud infrastructure. They sit at the intersection of security engineering and platform engineering — writing code that enforces policy, automates compliance checks, and surfaces vulnerabilities before software reaches production. Their work removes manual security gates that slow delivery while making the overall system harder to compromise.
- DevSecOps Pipeline Security Engineer$115K–$185K
DevSecOps Pipeline Security Engineers embed security controls directly into software delivery pipelines, ensuring that code scanning, secrets detection, container hardening, and policy enforcement happen automatically at every stage from commit to deployment. They sit at the intersection of software engineering, cloud infrastructure, and application security — building the tooling and workflows that let development teams ship fast without accumulating security debt. This role operates across CI/CD platforms, cloud providers, and internal security tooling rather than at the perimeter.
- DevSecOps Optimization Engineer$115K–$175K
DevSecOps Optimization Engineers embed security controls and performance tuning directly into CI/CD pipelines, infrastructure-as-code workflows, and cloud environments — closing the gap between development velocity and security compliance. They own the toolchain: SAST/DAST scanners, secrets management, container hardening, and policy-as-code frameworks that let engineering teams ship fast without accumulating security debt. The role sits at the intersection of platform engineering, security architecture, and software delivery optimization.
- DevSecOps Platform Security Engineer$115K–$185K
DevSecOps Platform Security Engineers embed security controls directly into software delivery pipelines, cloud infrastructure, and developer toolchains — replacing the traditional model where security reviewed code after it was written. They design and operate the automated scanning, policy enforcement, secrets management, and runtime protection systems that let engineering teams ship quickly without bypassing security gates. The role sits at the intersection of software engineering, cloud infrastructure, and offensive security thinking.
- DevOps IT Service Management (ITSM) Engineer$95K–$140K
DevOps ITSM Engineers bridge traditional IT Service Management practices and modern DevOps delivery — designing and operating the change management, incident management, and service request workflows that govern how IT changes move through organizations while remaining compatible with high-frequency deployment pipelines. They configure, automate, and optimize ITSM platforms to support rapid delivery without sacrificing auditability.
- IT Consultant II$85K–$130K
An IT Consultant II is a mid-level technology advisor who designs, implements, and optimizes IT solutions for client organizations — translating business requirements into technical architectures and guiding projects from scoping through delivery. They operate with less oversight than a Consultant I, own client relationships on defined workstreams, and are expected to produce billable work product with measurable outcomes across infrastructure, software, or business-process domains.