The role involves automating security in the DevOps lifecycle, enhancing collaboration across teams, and integrating security practices throughout the software development process.
The incumbent will automate security into the DevOps lifecycle, collaborating across devel-opment, security, and operations teams to foster a security-first culture, and "shifting security left" by integrating security practices from the planning stage of software development. Key tasks involve automating security pro-cesses like vulnerability scanning and threat modelling, implementing secure coding practices, performing risk assessments, monitoring, and responding to security incidents to deliver secure, reliable software
ROLE DESCRIPTION SUMMARY
The incumbent will automate security into the DevOps lifecycle, collaborating across devel-opment, security, and operations teams to foster a security-first culture, and "shifting security left" by integrating security practices from the planning stage of software development. Key tasks involve automating security pro-cesses like vulnerability scanning and threat modelling, implementing secure coding practices, performing risk assessments, monitoring, and responding to security incidents to deliver secure, reliable software.
PRIMARY RESPONSIBILITIES / KEY RESULT AREAS
COMPETENCIES
QUALIFICATIONS & EXPERIENCE
OTHER KEY REQUIREMENTS / COMMENTS
SES and its Affiliated Companies are committed to providing fair and equal employment opportunities to all. We are an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law.
For more information on SES, click here .
ROLE DESCRIPTION SUMMARY
The incumbent will automate security into the DevOps lifecycle, collaborating across devel-opment, security, and operations teams to foster a security-first culture, and "shifting security left" by integrating security practices from the planning stage of software development. Key tasks involve automating security pro-cesses like vulnerability scanning and threat modelling, implementing secure coding practices, performing risk assessments, monitoring, and responding to security incidents to deliver secure, reliable software.
PRIMARY RESPONSIBILITIES / KEY RESULT AREAS
- SDLC Automation: Automate repetitive tasks across the SDLC including infrastructure provisioning, software testing and software deployment;
- Infrastructure automation: Write IaC code to define and manage the infrastructure to ensure automatic provisioning and optimization;
- CI/CD Pipelines: Design, build and maintain CI/CD pipelines to enable continuous integration, testing, and development of software;
- Monitoring and Logging: Implement and manage monitoring, logging and alerting systems to ensure Reliability, Security, Performance efficiency, Cost Optimization and Operational Excellence;
- Security & Compliance: Automate Security best practices into the SDLC and IaC;
- Troubleshooting and Optimization: Analyse production issues, perform root cause analysis, and troubleshoot deployment failures or infrastructure outages;
- Collaboration: Collaborate with software development, ground and satellite operation, QA, Architecture, Security and IT teams to ensure seamless integration and smooth software development lifecycle
COMPETENCIES
- Ability to work in an agile, high-paced environment and deliver within tight timelines
- Ability to tackle complex projects and develop workable solutions
- Ability to take ownership and drive a task to the conclusion without supervision
- Excellent analytical and problem-solving skills
- Excellent collaboration skills with the ability to communicate effectively with cross-functional teams
- Excellent communication skills to collaborate effectively with various teams and stakeholders
QUALIFICATIONS & EXPERIENCE
- Graduate in Computer Science or Software Engineering (Bachelor's or Master's Degree level)
- Certified Cloud Engineer or Equivalent
- Minimum 8 years of relevant work experience in Cybersecurity, Cloud Management, Software Development or System Administration
- Solid Grasp on Linux Server Kubernetes Cluster Administration
- Solid Grasp of Software Security Concepts
- Excellent understanding of Radio Frequency and Satellite Communications
- Excellent understanding of the entire Software Development Lifecycle
- Knowledge of the best security practices and principles
- Excellent expertise in programming and automations
OTHER KEY REQUIREMENTS / COMMENTS
- NATO Security Clearance
SES and its Affiliated Companies are committed to providing fair and equal employment opportunities to all. We are an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law.
For more information on SES, click here .
Top Skills
Ci/Cd
Devsecops
Iac
Kubernetes
Intelsat, now part of SES Colorado Springs, Colorado, USA Office
558 East Pikes Peak, Colorado Springs, CO, United States, 80903
Similar Jobs at Intelsat, now part of SES
Aerospace • Digital Media • Information Technology • Internet of Things • Mobile • Software
The HRBP will align HR initiatives with business goals, enhance employee experience, and implement HR programs while fostering positive work culture.
Top Skills:
HrisSAPSuccess Factor
Aerospace • Digital Media • Information Technology • Internet of Things • Mobile • Software
The Director, HR Business Partners drives HR strategy, enhances employee engagement, manages HR programs, and collaborates with stakeholders to align HR initiatives with business goals.
Top Skills:
Hris SystemsSAPSuccess Factors
Aerospace • Digital Media • Information Technology • Internet of Things • Mobile • Software
This role leads incident response to insider threats, analyzes security logs, monitors network traffic, and creates comprehensive reports. It requires strong critical thinking and organizational skills.
Top Skills:
EdrFirewallIds/IpsSecurity Information And Event Management (Siem)
What you need to know about the Colorado Tech Scene
With a business-friendly climate and research universities like CU Boulder and Colorado State, Colorado has made a name for itself as a startup ecosystem. The state boasts a skilled workforce and high quality of life thanks to its affordable housing, vibrant cultural scene and unparalleled opportunities for outdoor recreation. Colorado is also home to the National Renewable Energy Laboratory, helping cement its status as a hub for renewable energy innovation.
Key Facts About Colorado Tech
- Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
- Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
- Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
- Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

