Information Technology
DevSecOps Research Security Engineer
Last updated
DevSecOps Research Security Engineers embed security practices directly into software development and CI/CD pipelines — combining hands-on vulnerability research, threat modeling, and toolchain automation to find and fix security defects before code reaches production. They sit at the intersection of offensive security thinking and engineering discipline, translating research findings into automated controls, policy as code, and developer-facing security tooling that scales across large engineering organizations.
Role at a glance
- Typical education
- Bachelor's degree in CS, Software Engineering, or Information Security; or demonstrable research output (CVEs, etc.)
- Typical experience
- 5-8 years
- Key certifications
- OSCP, OSWE, CKS, AWS Security Specialty
- Top employer types
- Large technology companies, defense and federal agencies, financial services, healthcare technology
- Growth outlook
- Strong demand driven by software supply chain attacks and federal compliance mandates like CISA's Secure by Design.
- AI impact (through 2030)
- Strong tailwind — AI code generation introduces new vulnerability patterns at volume, creating net-new work for engineers to build evaluation frameworks and detection classifiers.
Duties and responsibilities
- Design and implement automated security scanning gates — SAST, DAST, SCA, and container image analysis — integrated directly into CI/CD pipelines
- Conduct original vulnerability research on internal platforms, SDKs, and third-party dependencies to identify exploitable weaknesses before external discovery
- Develop threat models for new product features and infrastructure changes using STRIDE or PASTA frameworks in collaboration with engineering teams
- Author and maintain security-as-code policies using OPA, Checkov, or equivalent tools enforced at pipeline and infrastructure provisioning layers
- Triage and validate findings from automated scanners, distinguishing true positives from false positives and prioritizing remediation by exploitability
- Build custom fuzzing harnesses and exploit proof-of-concepts to demonstrate the real-world impact of identified vulnerabilities to product and leadership teams
- Lead purple team exercises by simulating adversary TTPs against internal systems and translating attack paths into hardening requirements and detection rules
- Define and maintain software supply chain security controls including SBOM generation, artifact signing with Sigstore/Cosign, and dependency pinning policies
- Partner with platform engineering teams to harden Kubernetes, container runtimes, and cloud IAM configurations based on CIS benchmarks and research findings
- Produce written research reports and internal security advisories communicating vulnerability technical details, exploitability, and remediation guidance to diverse audiences
Overview
DevSecOps Research Security Engineers are the people who make security something a software organization does continuously rather than a gate it passes through once before shipping. The role combines two disciplines that are usually separate — pipeline security engineering and vulnerability research — into a single function focused on finding real attack paths and closing them before adversaries do.
On any given week, the work moves between several modes. Some time goes toward pipeline work: writing Semgrep rules that catch a specific insecure pattern the team keeps introducing, debugging why a container scanner is producing 400 false positives on a base image, or building an SBOM generation step into a deployment workflow that currently has none. This engineering work is detailed, iterative, and often unglamorous — but it's what makes security scale across an organization of hundreds of developers.
The research component is where the role differentiates. A DevSecOps Research Security Engineer doesn't just run established scanners — they investigate whether the scanners are missing something important. That might mean building a fuzzing harness against an internal RPC interface, tracing a third-party library's data handling to find an undocumented deserialization path, or reverse-engineering a compiled binary to understand whether a vendor's security claim holds up. When research produces a finding, the engineer writes it up as an internal advisory, builds a proof-of-concept to show real impact, and works with the team to drive remediation to completion.
The purple team dimension — simulating adversary behavior against internal infrastructure — is increasingly part of the job description at companies serious about this function. Running a simulated attack chain through CI/CD infrastructure, exfiltrating build secrets from a misconfigured pipeline, and documenting the path afterward produces hardening requirements that no compliance checklist would have surfaced.
Soft skills matter more than most security roles acknowledge. A research finding that can't be communicated to a product manager who controls the engineering roadmap will sit in a backlog indefinitely. The engineers who move organizations are the ones who write clear advisories, present findings without condescension, and understand that developer experience matters — a security control that makes people's jobs harder gets worked around.
Qualifications
Education:
- Bachelor's degree in computer science, software engineering, or information security (common but not universal)
- Self-taught engineers with demonstrable research output — CVEs, conference presentations, open-source security tooling — are regularly hired at senior levels without formal degrees
- Graduate degrees in cybersecurity or systems security provide depth in cryptography and formal verification, valued in research-heavy roles
Experience benchmarks:
- 5–8 years for mid-senior roles; most positions expect prior application security, penetration testing, or secure development experience
- Direct CI/CD engineering background is a significant differentiator — candidates who have built pipelines, not just tested them, understand the constraints that determine what controls are actually deployable
- Demonstrated vulnerability research: CVE credits, bug bounty history, published writeups, or internal research program contributions
Core technical skills:
- Static analysis: Semgrep rule authoring, CodeQL query writing, SonarQube configuration and tuning
- Dynamic testing: Burp Suite extensions, custom fuzzing with libFuzzer or AFL++, API security testing
- Container and Kubernetes security: Trivy, Grype, Falco, OPA/Gatekeeper, Pod Security Admission
- Cloud security: AWS IAM policy analysis, CloudTrail anomaly detection, Azure Defender for DevOps integration
- IaC scanning: Checkov, tfsec, Terrascan against Terraform and Helm chart repositories
- Supply chain: SBOM formats (CycloneDX, SPDX), Sigstore/Cosign artifact signing, SLSA framework implementation
Certifications (valued):
- OSCP, OSWE, or OSED for offensive research credibility
- GREM, GXPN, or GWEB for depth in specific research domains
- AWS Security Specialty, Google PCSE, or Certified Kubernetes Security Specialist (CKS) for cloud-native roles
- CSSLP (Certified Secure Software Lifecycle Professional) for organizations requiring formal SDLC credentials
Security clearance:
- DoD Secret or TS/SCI required for defense and federal agency roles; significant pay premium attached
Career outlook
Demand for security engineers who can operate inside software delivery pipelines — not just audit them from the outside — has outpaced supply for several years and shows no sign of equilibrating. The gap between organizations that need this function and candidates who can fill it has stayed wide despite increased university program output and bootcamp proliferation, because the role requires both offensive security intuition and production engineering experience. That combination takes time to develop and can't be compressed into a credential.
Several structural trends are sustaining demand through the late 2020s. Software supply chain attacks — SolarWinds, XZ Utils, the continued stream of malicious npm and PyPI packages — have pushed executive attention and board-level budget toward pipeline security controls. CISA's Secure by Design initiative and the White House Executive Order on software security created compliance pressure that flows down to organizations developing software for federal customers, which is a large fraction of the enterprise software market. These external pressures translate directly into headcount for people who can implement SBOM programs, artifact signing infrastructure, and provenance verification at scale.
The AI code generation wave is creating new work faster than it's displacing existing roles. Security teams at companies deploying AI coding assistants are discovering that generated code introduces vulnerability patterns at volume that manual code review never had to handle — and that traditional SAST rules don't catch reliably. Building evaluation frameworks, training classifiers to detect insecure AI-generated patterns, and securing the LLM inference infrastructure itself are all net-new scopes landing on DevSecOps Research engineers.
Compensation is strong and has not compressed significantly despite the broader tech hiring slowdown of 2023–2024. The research component differentiates this role from commodity security engineering and creates a talent market where a published CVE or a recognized open-source security tool contribution genuinely moves a candidate's negotiating position.
Career trajectories from this role are varied: principal security engineer tracks at large technology companies, security research leadership at specialized firms, staff-level platform security roles, or founding security at growth-stage companies where the scope is broad and the equity is meaningful. The skills transfer well across industries — financial services, healthcare technology, and defense all hire this profile at premium rates.
Sample cover letter
Dear Hiring Manager,
I'm applying for the DevSecOps Research Security Engineer role at [Company]. I've spent the past six years doing application security and pipeline engineering work — most recently as a senior security engineer at [Company], where I own the SDLC security toolchain for a platform processing roughly 40 million API requests per day.
The work I'm most proud of from this role started as a routine investigation into why our SAST scanner was flagging a pattern in our internal gRPC framework inconsistently. What I found was an undocumented deserialization path in the framework's reflection-based message handling that could be reached from an unauthenticated endpoint under specific load-balancer conditions. I built a proof-of-concept exploit, wrote the advisory, and worked with the framework team to redesign the input validation layer — then wrote the Semgrep rule that would have caught the pattern at code-review time and backfilled it against the full repository history. That full cycle — from fuzzing to fix to detection rule — is the kind of work I want to do more of.
On the pipeline side, I led our SBOM and artifact signing rollout last year: CycloneDX generation at build time, Cosign signing with Sigstore's transparency log, and Rego policy in OPA verifying provenance before any artifact reaches production. The hardest part wasn't the tooling — it was getting 60 engineering teams to change their build configurations without feeling like security was breaking their release velocity. I handled that by writing the migration tooling myself so the change was a one-line addition to each team's pipeline template.
I've been tracking [Company]'s work on [relevant product area or public security research] and I think the problem space your team is working on is where I want to focus the next chapter. I'd welcome the chance to talk through it.
[Your Name]
Frequently asked questions
- What distinguishes a DevSecOps Research Security Engineer from a standard application security engineer?
- A standard AppSec engineer typically works through existing tooling and review processes — code reviews, scanner triage, and developer guidance on known vulnerability classes. A DevSecOps Research engineer goes further upstream: conducting original research to discover novel vulnerability patterns, building or customizing the tooling itself, and driving architectural security changes from first principles. The research component means the role involves producing new security knowledge, not just applying established practices.
- Is a security clearance typically required for this role?
- Not universally, but cleared positions at defense contractors, national labs, and federal system integrators make up a significant slice of the market and pay accordingly. Commercial companies in fintech, cloud infrastructure, and enterprise software generally don't require clearances. Candidates who hold an active TS or TS/SCI can command a meaningful premium and access a less competitive hiring pool.
- What programming languages and tools does this role require at a working level?
- Python is the baseline for scripting and tooling; Go is increasingly standard for building security tooling that needs to run in production environments. Familiarity with Bash, Rust for memory-safety research contexts, and at least one JVM language (Java or Kotlin) is expected at senior levels. On the tooling side: Semgrep, Burp Suite, OWASP ZAP, Trivy, Grype, Falco, and Terraform or Pulumi for IaC security scanning are commonly cited in job requirements.
- How is AI affecting this role in 2025–2026?
- AI code generation tools — GitHub Copilot, Claude, and similar — are introducing new vulnerability patterns at scale: prompt injection surfaces in LLM-integrated features, insecure deserialization from auto-generated parsers, and supply chain risks from AI-suggested dependencies. DevSecOps Research engineers are increasingly asked to build evaluation frameworks for AI-generated code, develop detection rules for LLM-specific attack surfaces, and assess the security properties of ML model serving infrastructure — all areas where prior security playbooks don't directly apply.
- What certifications carry the most weight for this role?
- OSCP (Offensive Security Certified Professional) signals credible hands-on offensive capability and is widely recognized. GREM (GIAC Reverse Engineering Malware) or GXPN (Exploit Researcher and Advanced Penetration Tester) demonstrate research depth. Cloud-specific certifications — AWS Security Specialty or Google Professional Cloud Security Engineer — matter for roles heavily focused on cloud-native pipeline security. A published CVE or public security research is often worth more than any certification in competitive hiring.
More in Information Technology
See all Information Technology jobs →- DevSecOps Reporting Analyst$85K–$135K
DevSecOps Reporting Analysts sit at the intersection of software engineering, security operations, and business intelligence — collecting, normalizing, and communicating security metrics across CI/CD pipelines and cloud infrastructure. They translate raw vulnerability scan data, SAST/DAST findings, and compliance posture into dashboards and reports that help engineering leadership and security teams make prioritization decisions. The role is equal parts data engineering, security domain knowledge, and stakeholder communication.
- DevSecOps Risk Analyst$95K–$155K
DevSecOps Risk Analysts sit at the intersection of software delivery and security governance, translating vulnerability data, threat models, and compliance requirements into actionable risk decisions that engineering teams can act on without grinding the pipeline to a halt. They work across development, security, and operations functions to embed risk assessments into CI/CD workflows, evaluate findings from SAST, DAST, and SCA tools, and ensure that security gates in the delivery pipeline reflect actual business risk rather than checkbox compliance.
- DevSecOps Release Manager$105K–$165K
A DevSecOps Release Manager owns the end-to-end software delivery pipeline — coordinating development, security, and operations teams to ship code that is tested, hardened, and deployable on a predictable cadence. They enforce release governance, embed security controls directly into CI/CD workflows, and act as the single accountable party when a deployment window opens or a rollback is needed. The role sits at the intersection of engineering velocity and organizational risk tolerance.
- DevSecOps Scaling Security Engineer$118K–$195K
DevSecOps Scaling Security Engineers embed security controls directly into CI/CD pipelines, infrastructure-as-code workflows, and cloud-native platforms — then build the tooling and governance that makes those controls scale across hundreds of engineering teams without becoming a bottleneck. They sit at the intersection of platform engineering, application security, and cloud infrastructure, translating security requirements into automated policy enforcement that developers can ship around rather than argue with.
- DevOps IT Service Management (ITSM) Engineer$95K–$140K
DevOps ITSM Engineers bridge traditional IT Service Management practices and modern DevOps delivery — designing and operating the change management, incident management, and service request workflows that govern how IT changes move through organizations while remaining compatible with high-frequency deployment pipelines. They configure, automate, and optimize ITSM platforms to support rapid delivery without sacrificing auditability.
- IT Consultant II$85K–$130K
An IT Consultant II is a mid-level technology advisor who designs, implements, and optimizes IT solutions for client organizations — translating business requirements into technical architectures and guiding projects from scoping through delivery. They operate with less oversight than a Consultant I, own client relationships on defined workstreams, and are expected to produce billable work product with measurable outcomes across infrastructure, software, or business-process domains.