Role:  Cloud/SRE/DevSecOps Engineer || Location: Remote

0 views
Skip to first unread message

SASI KUMAR DOVALA

unread,
May 21, 2026, 9:28:17 AM (3 days ago) May 21
to SASI KUMAR DOVALA

Role:  Cloud/SRE/DevSecOps Engineer

Location: Remote
Visa: No H1B 

About the Role
We are seeking a Security & Compliance Readiness Engineer to join our General Availability (GA) Readiness initiative on a contract basis. This role owns the security hardening and technical compliance work required to bring our application to a production-ready security posture ahead of public launch. Our application handles PHI via a FHIR-compliant data layer, and our GA milestone includes navigating a significant enterprise security assessment program. Stakeholder coordination, enterprise program enrollment management, and cross-functional dependency tracking for the compliance workstream are supported by the Engineering Manager — this role focuses on the technical execution: hardening, auditing, validating, and documenting. OTel instrumentation is a shared responsibility between both contractor roles: the paired Launch Readiness Engineer owns the telemetry pipeline and performance observability layer; this role owns structured audit logging, log granularity requirements, and PHI/PII data masking within that same pipeline.
What You'll Do
• Execute technical security hardening tasks surfaced through our enterprise security assessment program — working from a prioritized backlog with coordination support from the Engineering Manager.
• Conduct technical spike investigations across the codebase and infrastructure configurations — auditing against security requirements and documenting findings as confirmed open, resolved, or partially addressed, with scoped implementation recommendations.
• Own the structured audit logging layer within our OpenTelemetry pipeline — defining log granularity requirements (who, what, when, where, outcome, entity identity), validating implementation, and confirming PHI/PII data masking in DataDog and other observability tooling. Coordinate with the LRE on pipeline architecture and routing.
• Audit and harden TLS configurations, cipher suite settings (FIPS 140-2 compliance), and CORS policies across application and infrastructure layers.
• Review and validate RBAC implementation across application, Kubernetes, and database layers; produce access control documentation for InfoSec evidence submission.
• Audit secrets management practices — Azure Key Vault configuration, secret rotation policies, and CyberArk or equivalent PAM integration.
• Review and validate Okta IdP configuration — session timeout enforcement, MFA policies, lockout configuration, and Saviynt IAM integration.
• Integrate and validate SAST/DAST/SCA tooling (e.g., Veracode or equivalent) into CI/CD pipelines; triage findings and drive remediation prioritization with engineering.
• Support penetration testing engagement by providing technical context, validating scope, and driving remediation of critical and high-severity findings prior to GA.
• Validate and document PostgreSQL backup enablement, restore testing procedures, encryption-at-rest configuration, and data retention policies.
• Contribute to RTO/RPO target definition and validate database rollback and recovery runbooks.
• Produce formal data flow architecture diagrams and technical compliance documentation suitable for InfoSec evidence submission.
• Own vulnerability management execution — technical triage, remediation prioritization, and tracking; report status to the Engineering Manager for upstream coordination.
• Define incident response procedures and contribute to Major Incident Management (MIM) documentation in coordination with the Launch Readiness Engineer.
What We're Looking For
• 5+ years of experience in security engineering or application security, with a track record of hands-on technical delivery in a compliance-adjacent context.
• Familiarity with enterprise security assessment programs — sufficient to execute technical tasks within an active assessment, with coordination overhead handled by others.
• Experience owning structured audit logging requirements — defining log schemas, validating implementation against compliance standards, and auditing for PHI/PII exposure in observability tooling.
• Hands-on experience with TLS/cipher hardening, CORS policy configuration, and FIPS 140-2 compliance validation.
• Working knowledge of SAST/DAST/SCA tooling (Veracode, Snyk, Checkmarx, or equivalent) and CI/CD pipeline integration.
• Experience with secrets management platforms — Azure Key Vault, CyberArk, or equivalent — including rotation practices and audit validation.
• Familiarity with Okta or equivalent IdP: session policy configuration, MFA enforcement, lockout policies, and IAM platform integration.
• Understanding of PHI/PII data handling requirements and data masking in observability and logging tooling.
• PostgreSQL experience relevant to security and compliance: backup/restore validation, encryption-at-rest, and retention policy configuration.
• Ability to produce clear technical security documentation: data flow diagrams, RBAC matrices, DR runbooks, and compliance evidence artifacts.
• Strong individual contributor mindset — able to move independently on a technical backlog with light coordination support.
• Experience with vulnerability management execution: technical triage, prioritization, and remediation tracking.
Nice to Have
• Experience in a healthcare data context — HIPAA compliance, FHIR application security patterns, or clinical data platform security reviews.
• Familiarity with enterprise security tooling: Imperva WAF, Splunk SIEM, SentinelOne, KeyFactor, OneTrust TPRM, or CyberArk PAM.
• Exposure to Azure security services — Microsoft Defender for Cloud, Azure Policy, or Azure Security Center.
• Experience coordinating with third-party penetration testing vendors and tracking findings through to remediation closure.
• Exposure to Kubernetes security hardening — network policies, pod security standards, and workload identity.
• Familiarity with OpenTelemetry pipeline architecture — sufficient to coordinate effectively with the LRE on shared instrumentation boundaries.
• Experience with ServiceNow or equivalent change management tooling for audit-relevant change records.
Engagement Details
• Contract duration aligned to GA launch milestone, with potential for extension.
• Enterprise program enrollment coordination and cross-functional stakeholder management are supported by the Engineering Manager — this role focuses on technical execution.
• Works in close coordination with a paired Launch Readiness Engineer, with a shared ownership boundary on OTel/audit logging.
• Remote-friendly; overlap with core business hours required.

Regards,

Sasikumar

cid:image001.jpg@01DC0160.520B4230


 Address: 15 Corporate Pl S, Suite #450, Piscataway Township, NJ 08854

 Email: sasi....@intellyk.com | Website: www.intellyk.com

 cid:image002.png@01DC0160.520B4230

 

DISCLAIMER: THIS IS NOT UNSOLICITED MAIL. UNDER BILL 1618 TITLE III PASSED BY THE 105TH USA CONGRESS THIS EMAIL CANNOT BE CONSIDERED AS SPAM AS LONG AS WE INCLUDE OUR CONTACT INFORMATION AND AN OPTION TO BE REMOVED FROM OUR EMAILING LIST. IF YOU HAVE RECEIVED THIS MESSAGE IN ERROR OR, ARE NOT INTERESTED IN RECEIVING OUR EMAILS, PLEASE ACCEPT OUR APOLOGIES. PLEASE REPLY WITH REMOVE IN THE SUBJECT LINE. ALL REMOVAL REQUESTS WILL BE HONORED. WE SINCERELY APOLOGIZE FOR ANY INCONVENIENCE CAUSED

 


 



SASI KUMAR DOVALA

unread,
May 21, 2026, 9:28:19 AM (3 days ago) May 21
to SASI KUMAR DOVALA

alfaz.te...@gmail.com

unread,
May 21, 2026, 10:41:25 AM (3 days ago) May 21
to usitc2c...@googlegroups.com

Hello ALL,

FOR all H1b consultant, PASSPORT NUMBERS, Visa stamp page, I94 & TRAVEL HISTORY will be provided along with rate confirmation.

  1. Consultant Details:

AWS DevOps Engineer | Platform Engineer | Kubernetes (EKS) | Site Reliability Engineer (SRE) - Production Support | Cloud Infrastructure / Automation | GitOps | DevSecOps | Infrastructure as Code (IaC) |

Name:                  Venkata Ramesh chandu
Visa Status:         H1B
Date of Birth:      April 1982
Experience:        14 Years
Location:              King of Prussia, PA
Relocate:              Open
Education:           Bachelor of Engineer in Computer Science

  1. CONSULTANT SUBMISSION DETAILS: 

SRE / DevOps | Multi-cloud infrastructure (AWS/Azure/GCP) | Kubernetes platforms | CI/CD automation | Cloud governance & observability | | AI tooling exposure | AI-assisted automation | Python automation

 

Name:                                Uday Naik Bukke
Location:                            Marietta, Georgia
Relocate:                           Yes
Date of Birth:                   07/1995
Work Authorization:      H1-B
Total Experience:             10 Years
Notice Period:                  Immediate

  1. CONSULTANT SUBMISSION DETAILS:   

 

DevOps / DevSecOps / Site Reliability Engineer | AZURE | AWS | Kubernetes Admin

 

Name:                                 Pradeep Kumar Nara
Date of Birth:                    10/1989
Relocation:                        Yes
Current Location:             Dallas, TX
Visa:                                    H1B
Education:                         MS, 2016
Total Experience:             12+ Years

 

 

Thanks & Regards

 

Alfaz Karaami

TEK TREE LLC
signature_1663250352

Email:      al...@tektreeinc.com

Phone:     302-248-8015

LinkedIn : https://www.linkedin.com/in/alfazkaraami/

Website:  www.tektreeinc.com

Address:  1106 Drummond Plaza

                Newark, DE 19711

 

 

 

image001.png
Venkata - Devops Engineer - AWS - Kubernetes (EKS) - SRE.docx
Uday_Bukke_Resume.docx
Pradeep_Nara_DevOps Engineer.docx
Reply all
Reply to author
Forward
0 new messages