JobDescription.org

Information Technology

DevSecOps Research Security Engineer

Last updated

DevSecOps Research Security Engineers embed security practices directly into software development and CI/CD pipelines — combining hands-on vulnerability research, threat modeling, and toolchain automation to find and fix security defects before code reaches production. They sit at the intersection of offensive security thinking and engineering discipline, translating research findings into automated controls, policy as code, and developer-facing security tooling that scales across large engineering organizations.

Role at a glance

Typical education
Bachelor's degree in CS, Software Engineering, or Information Security; or demonstrable research output (CVEs, etc.)
Typical experience
5-8 years
Key certifications
OSCP, OSWE, CKS, AWS Security Specialty
Top employer types
Large technology companies, defense and federal agencies, financial services, healthcare technology
Growth outlook
Strong demand driven by software supply chain attacks and federal compliance mandates like CISA's Secure by Design.
AI impact (through 2030)
Strong tailwind — AI code generation introduces new vulnerability patterns at volume, creating net-new work for engineers to build evaluation frameworks and detection classifiers.

Duties and responsibilities

  • Design and implement automated security scanning gates — SAST, DAST, SCA, and container image analysis — integrated directly into CI/CD pipelines
  • Conduct original vulnerability research on internal platforms, SDKs, and third-party dependencies to identify exploitable weaknesses before external discovery
  • Develop threat models for new product features and infrastructure changes using STRIDE or PASTA frameworks in collaboration with engineering teams
  • Author and maintain security-as-code policies using OPA, Checkov, or equivalent tools enforced at pipeline and infrastructure provisioning layers
  • Triage and validate findings from automated scanners, distinguishing true positives from false positives and prioritizing remediation by exploitability
  • Build custom fuzzing harnesses and exploit proof-of-concepts to demonstrate the real-world impact of identified vulnerabilities to product and leadership teams
  • Lead purple team exercises by simulating adversary TTPs against internal systems and translating attack paths into hardening requirements and detection rules
  • Define and maintain software supply chain security controls including SBOM generation, artifact signing with Sigstore/Cosign, and dependency pinning policies
  • Partner with platform engineering teams to harden Kubernetes, container runtimes, and cloud IAM configurations based on CIS benchmarks and research findings
  • Produce written research reports and internal security advisories communicating vulnerability technical details, exploitability, and remediation guidance to diverse audiences

Overview

DevSecOps Research Security Engineers are the people who make security something a software organization does continuously rather than a gate it passes through once before shipping. The role combines two disciplines that are usually separate — pipeline security engineering and vulnerability research — into a single function focused on finding real attack paths and closing them before adversaries do.

On any given week, the work moves between several modes. Some time goes toward pipeline work: writing Semgrep rules that catch a specific insecure pattern the team keeps introducing, debugging why a container scanner is producing 400 false positives on a base image, or building an SBOM generation step into a deployment workflow that currently has none. This engineering work is detailed, iterative, and often unglamorous — but it's what makes security scale across an organization of hundreds of developers.

The research component is where the role differentiates. A DevSecOps Research Security Engineer doesn't just run established scanners — they investigate whether the scanners are missing something important. That might mean building a fuzzing harness against an internal RPC interface, tracing a third-party library's data handling to find an undocumented deserialization path, or reverse-engineering a compiled binary to understand whether a vendor's security claim holds up. When research produces a finding, the engineer writes it up as an internal advisory, builds a proof-of-concept to show real impact, and works with the team to drive remediation to completion.

The purple team dimension — simulating adversary behavior against internal infrastructure — is increasingly part of the job description at companies serious about this function. Running a simulated attack chain through CI/CD infrastructure, exfiltrating build secrets from a misconfigured pipeline, and documenting the path afterward produces hardening requirements that no compliance checklist would have surfaced.

Soft skills matter more than most security roles acknowledge. A research finding that can't be communicated to a product manager who controls the engineering roadmap will sit in a backlog indefinitely. The engineers who move organizations are the ones who write clear advisories, present findings without condescension, and understand that developer experience matters — a security control that makes people's jobs harder gets worked around.

Qualifications

Education:

  • Bachelor's degree in computer science, software engineering, or information security (common but not universal)
  • Self-taught engineers with demonstrable research output — CVEs, conference presentations, open-source security tooling — are regularly hired at senior levels without formal degrees
  • Graduate degrees in cybersecurity or systems security provide depth in cryptography and formal verification, valued in research-heavy roles

Experience benchmarks:

  • 5–8 years for mid-senior roles; most positions expect prior application security, penetration testing, or secure development experience
  • Direct CI/CD engineering background is a significant differentiator — candidates who have built pipelines, not just tested them, understand the constraints that determine what controls are actually deployable
  • Demonstrated vulnerability research: CVE credits, bug bounty history, published writeups, or internal research program contributions

Core technical skills:

  • Static analysis: Semgrep rule authoring, CodeQL query writing, SonarQube configuration and tuning
  • Dynamic testing: Burp Suite extensions, custom fuzzing with libFuzzer or AFL++, API security testing
  • Container and Kubernetes security: Trivy, Grype, Falco, OPA/Gatekeeper, Pod Security Admission
  • Cloud security: AWS IAM policy analysis, CloudTrail anomaly detection, Azure Defender for DevOps integration
  • IaC scanning: Checkov, tfsec, Terrascan against Terraform and Helm chart repositories
  • Supply chain: SBOM formats (CycloneDX, SPDX), Sigstore/Cosign artifact signing, SLSA framework implementation

Certifications (valued):

  • OSCP, OSWE, or OSED for offensive research credibility
  • GREM, GXPN, or GWEB for depth in specific research domains
  • AWS Security Specialty, Google PCSE, or Certified Kubernetes Security Specialist (CKS) for cloud-native roles
  • CSSLP (Certified Secure Software Lifecycle Professional) for organizations requiring formal SDLC credentials

Security clearance:

  • DoD Secret or TS/SCI required for defense and federal agency roles; significant pay premium attached

Career outlook

Demand for security engineers who can operate inside software delivery pipelines — not just audit them from the outside — has outpaced supply for several years and shows no sign of equilibrating. The gap between organizations that need this function and candidates who can fill it has stayed wide despite increased university program output and bootcamp proliferation, because the role requires both offensive security intuition and production engineering experience. That combination takes time to develop and can't be compressed into a credential.

Several structural trends are sustaining demand through the late 2020s. Software supply chain attacks — SolarWinds, XZ Utils, the continued stream of malicious npm and PyPI packages — have pushed executive attention and board-level budget toward pipeline security controls. CISA's Secure by Design initiative and the White House Executive Order on software security created compliance pressure that flows down to organizations developing software for federal customers, which is a large fraction of the enterprise software market. These external pressures translate directly into headcount for people who can implement SBOM programs, artifact signing infrastructure, and provenance verification at scale.

The AI code generation wave is creating new work faster than it's displacing existing roles. Security teams at companies deploying AI coding assistants are discovering that generated code introduces vulnerability patterns at volume that manual code review never had to handle — and that traditional SAST rules don't catch reliably. Building evaluation frameworks, training classifiers to detect insecure AI-generated patterns, and securing the LLM inference infrastructure itself are all net-new scopes landing on DevSecOps Research engineers.

Compensation is strong and has not compressed significantly despite the broader tech hiring slowdown of 2023–2024. The research component differentiates this role from commodity security engineering and creates a talent market where a published CVE or a recognized open-source security tool contribution genuinely moves a candidate's negotiating position.

Career trajectories from this role are varied: principal security engineer tracks at large technology companies, security research leadership at specialized firms, staff-level platform security roles, or founding security at growth-stage companies where the scope is broad and the equity is meaningful. The skills transfer well across industries — financial services, healthcare technology, and defense all hire this profile at premium rates.

Sample cover letter

Dear Hiring Manager,

I'm applying for the DevSecOps Research Security Engineer role at [Company]. I've spent the past six years doing application security and pipeline engineering work — most recently as a senior security engineer at [Company], where I own the SDLC security toolchain for a platform processing roughly 40 million API requests per day.

The work I'm most proud of from this role started as a routine investigation into why our SAST scanner was flagging a pattern in our internal gRPC framework inconsistently. What I found was an undocumented deserialization path in the framework's reflection-based message handling that could be reached from an unauthenticated endpoint under specific load-balancer conditions. I built a proof-of-concept exploit, wrote the advisory, and worked with the framework team to redesign the input validation layer — then wrote the Semgrep rule that would have caught the pattern at code-review time and backfilled it against the full repository history. That full cycle — from fuzzing to fix to detection rule — is the kind of work I want to do more of.

On the pipeline side, I led our SBOM and artifact signing rollout last year: CycloneDX generation at build time, Cosign signing with Sigstore's transparency log, and Rego policy in OPA verifying provenance before any artifact reaches production. The hardest part wasn't the tooling — it was getting 60 engineering teams to change their build configurations without feeling like security was breaking their release velocity. I handled that by writing the migration tooling myself so the change was a one-line addition to each team's pipeline template.

I've been tracking [Company]'s work on [relevant product area or public security research] and I think the problem space your team is working on is where I want to focus the next chapter. I'd welcome the chance to talk through it.

[Your Name]

Frequently asked questions

What distinguishes a DevSecOps Research Security Engineer from a standard application security engineer?
A standard AppSec engineer typically works through existing tooling and review processes — code reviews, scanner triage, and developer guidance on known vulnerability classes. A DevSecOps Research engineer goes further upstream: conducting original research to discover novel vulnerability patterns, building or customizing the tooling itself, and driving architectural security changes from first principles. The research component means the role involves producing new security knowledge, not just applying established practices.
Is a security clearance typically required for this role?
Not universally, but cleared positions at defense contractors, national labs, and federal system integrators make up a significant slice of the market and pay accordingly. Commercial companies in fintech, cloud infrastructure, and enterprise software generally don't require clearances. Candidates who hold an active TS or TS/SCI can command a meaningful premium and access a less competitive hiring pool.
What programming languages and tools does this role require at a working level?
Python is the baseline for scripting and tooling; Go is increasingly standard for building security tooling that needs to run in production environments. Familiarity with Bash, Rust for memory-safety research contexts, and at least one JVM language (Java or Kotlin) is expected at senior levels. On the tooling side: Semgrep, Burp Suite, OWASP ZAP, Trivy, Grype, Falco, and Terraform or Pulumi for IaC security scanning are commonly cited in job requirements.
How is AI affecting this role in 2025–2026?
AI code generation tools — GitHub Copilot, Claude, and similar — are introducing new vulnerability patterns at scale: prompt injection surfaces in LLM-integrated features, insecure deserialization from auto-generated parsers, and supply chain risks from AI-suggested dependencies. DevSecOps Research engineers are increasingly asked to build evaluation frameworks for AI-generated code, develop detection rules for LLM-specific attack surfaces, and assess the security properties of ML model serving infrastructure — all areas where prior security playbooks don't directly apply.
What certifications carry the most weight for this role?
OSCP (Offensive Security Certified Professional) signals credible hands-on offensive capability and is widely recognized. GREM (GIAC Reverse Engineering Malware) or GXPN (Exploit Researcher and Advanced Penetration Tester) demonstrate research depth. Cloud-specific certifications — AWS Security Specialty or Google Professional Cloud Security Engineer — matter for roles heavily focused on cloud-native pipeline security. A published CVE or public security research is often worth more than any certification in competitive hiring.
See all Information Technology jobs →