[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"project-cicd-engineer-mfd":3,"similar-cicd-engineer-mfd":41},{"id":4,"slug":5,"title":6,"skills":7,"budget":26,"duration":27,"location":28,"onsitePercent":29,"contractType":30,"foundAt":31,"category":32,"description":36,"rawText":37,"language":38,"projectId":39,"sourceUrl":40},1951,"cicd-engineer-mfd","CI\u002FCD Engineer (m\u002Ff\u002Fd)",[8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25],"DevOps","CI\u002FCD","Kubernetes","Docker","Terraform","GitOps","Argo CD","FluxCD","Harbor","Trivy","Prometheus","Grafana","Google Cloud Platform","GKE","GitLab","Security","SBOM","Vulnerability Management",null,"01.06.2026 - 31.12.2026 + Option","Frankfurt",50,"contracting","2026-05-12T17:02:23+00:00",{"id":33,"slug":34,"label":35},2,"devops_cloud","DevOps & Cloud","Design, implement, and maintain DevOps solutions with focus on security, CI\u002FCD pipelines, and Kubernetes platforms. Automate infrastructure provisioning, vulnerability management, and SBOM\u002FKBOM generation. Work with GitOps workflows and observability stacks.","CI\u002FCD Engineer (m\u002Ff\u002Fd)\n\nFrankfurt (50%) and Remote\n\nStart: 01.06.2026 (ASAP)\n\n5 days ago\n\nJob type:\nProject\n\nDuration:\n31.12.2026 + Option\n\nScope of work:\nfull-time - (100%)\n\nLanguages:\nEnglish\n\nID: 178520\n\nApply here\n\nWesthouse is one of the leading international recruitment agencies for the procurement of highly qualified experts in fields such as IT lifecycle management, SAP, engineering, commerce and specialist consultancy.\n\nFor our client we are currently looking for a CI\u002FCD Engineer (m\u002Ff\u002Fd) - Frankfurt (50%) and Remote.\n\nYour tasks\n\n- Design, implement, and maintain DevOps solutions while ensuring integrity, confidentiality, and availability of systems and tools to the program and data\n- Analysing of program requirements and design secure, robust DevOps architectures that address integration, scalability, and compliance needs.\n- Development and configuration of CI\u002FCD pipelines with built-in security scanning and compliance checks.\n- Implementing of secure configuration, access controls, and encryption for systems, repositories, and deployment pipelines.\n- Regularly monitoring and updating systems and tools to address security vulnerabilities and ensure ongoing compliance with security policies and standards.\n- Conducting risk assessments and threat modeling to proactively identify and mitigate potential weaknesses in DevOps workflows.\n- Providing automation of infrastructure provisioning and management using tools such as Terraform, Ansible, or Open- Tofu, following best practices for security and reliability.\n- Maintaining of system and service availability, including disaster recovery planning, incident response procedures, and routine backups.\n- Performing regular audits of configurations, user access, and system logs to ensure integrity and traceability.\n- Coordination with development and other stakeholders to resolve issues, implement new features, and keep all systems running optimally while adhering to confidentiality and data protection requirements.\n- Creating and maintain comprehensive documentation on architecture, configurations, processes, and incident response plans.\n- Expose security tools to developers in a self-service fashion\n- Designing and implementing user-friendly interfaces that allow developers to access security tools directly.\n- Automating the provisioning and configuration of security tools (e.g., through APIs or self-service portals) to streamline developer onboarding.\n- Integrating security tools into CI\u002FCD pipelines, making them available as part of standard development workflows.\n- Ensuring access controls are properly set up so developers can use security tools safely, without compromising sensitive data or system integrity.\n- Monitoring usage and availability of security tools to ensure developers experience minimal friction and downtime.\n- Providing documentation and support materials to help developers efficiently utilize available security tools.\n- Continuously gathering feedback from developers and improving the self-service experience based on their needs.\n- Documentation of frequently performed tasks for both internal and external customers\n- Identifying and cataloguing routine tasks and processes performed by the stakeholders or expected from users.\n- Writing clear, step-by-step guides and instructions for common operations, troubleshooting, and maintenance activities.\n- Creating visual aids such as flowcharts, diagrams, or screenshots to support written documentation and enhance understanding.\n- Reviewing and updating documentation regularly to ensure accuracy with evolving tools, systems, and procedures.\n- Gathering feedback from internal and external users to refine and clarify documentation based on their experiences and needs.\n- Ensuring documentation is accessible and organized in a central repository or knowledge base.\n- Creating quick reference materials, FAQs, and “How-to” videos for frequent questions or issues.\n- Standardizing documentation formats and templates for consistency across all materials\n- Increate automation efforts in automatically creating expansive SBOMs, KBOMs\n- Designing and developing scripts or workflows to automatically generate Software Bill of Materials (SBOMs) and Knowledge Bill of Materials (KBOMs) during build or deployment processes.\n- Integrating SBOM\u002FKBOM generation tools with CI\u002FCD pipelines to ensure bills are produced for every build and update.\n- Selecting and maintaining appropriate automation tools (such as Trivy, Syft, or others) that support comprehensive and accurate SBOM\u002FKBOM creation.\n- Testing and validating automated outputs to ensure completeness, correctness, and compliance with internal or regulatory standards.\n- Streamlining the user experience so developers and other stakeholders can access SBOMs\u002FKBOMs with minimal manual steps.\n- Addressing and shielding technical complexities related to SBOM\u002FKBOM management from end users, making automation seamless and robust.\n- Monitoring and optimizing automation workflows for performance and scalability as products or systems evolve.\n- Maintaining and updating automation scripts as new package ecosystems, dependencies, or regulatory requirements emerge.\n- Documenting the automated processes, including how the SBOMs\u002FKBOMs are generated, stored, and accessed\n- Vulnerability Management & Security Hardening\n- Continuously monitoring systems, applications, and containers for new vulnerabilities using automated scanning tools.\n- Analyzing vulnerability reports, prioritizing findings based on risk and potential impact.\n- Planning and applying remediation measures, such as patching software, updating dependencies, or changing configurations.\n- Coordinating and tracking vulnerability resolution with development, operations, and other relevant teams.\n- Documenting actions taken, including risk acceptance, mitigation, or escalation of critical issues.\n- Conducting regular security hardening activities, such as enforcing least privilege, disabling unnecessary services, and applying secure configuration baselines.\n- Performing penetration testing or vulnerability assessments and analyzing results to identify areas for hardening.\n- Updating hardened images and templates for system deployments in response to emerging threats or findings.\n- Reviewing and improving network and access controls to minimize attack surfaces.\n- Providing guidance and support to teams on secure development and operational practices.\n\nInterested?\n\nTobias Gollmann\n\nTel.: +49-89-383772-4135\nFax.: +49-89-99740779\nEmail: t.gollmann@westhouse-consulting.com\n\nApply here\n\nShare posting\n\nFacebook linkedin Xing twitter\n\nYour qualifications\n\n- Design and implement DevOps solutions ensuring integrity, confidentiality, and availability of systems and data\n- Proven experience implementing DevSecOps practices end-to-end, embedding security controls into CI\u002FCD pipelines and platform layers\n- Strong experience collaborating with Engineering, DevOps, and IT teams to integrate security into the software development lifecycle\n- Develop and document security processes, including vulnerability management and incident response\n- Extensive hands-on experience designing, operating, and troubleshooting large-scale Kubernetes platforms\n- Deep understanding of Kubernetes internals, including scheduling, networking (CNI), storage, RBAC, admission controllers, and API extensions\n- Experience implementing container and runtime security in Kubernetes environments\n- Strong knowledge of network\n- security in containerized environments (segmentation, policies, secure communication)\n- Strong hands-on experience with GitOps workflows using Argo CD and FluxCD in production environments\n- Strong hands-on experience with Infrastructure-as-Code using Terraform or OpenTofu\n- Experience integrating security controls into CI\u002FCD pipelines, including automated validation and compliance checks\n- Strong operational experience with Harbor as a central artifact registry\n- Solid understanding of software supply chain security, including artifact signing, provenance, attestations, and dependency tracking\n- Experience working with SBOM standards (e.g., CycloneDX) and integrating SBOMs into security workflows\n- Hands-on experience with security tooling such as Trivy, Dependency-Track, and DefectDojo\n- Strong expertise in building and operating observability stacks centered around Prometheus\n- Advanced experience with Grafana, including custom dashboards, plugins, and security-focused monitoring\n- Experience integrating metrics, logs, and traces into a cohesive observability platform (e.g., Prometheus, Loki, OpenTelemetry)\n- Strong hands-on experience with Google Cloud Platform, particularly:\n- GKE (cluster operations, security, networking)\n- IAM and workload identity\n- Networking (VPCs, private connectivity, service controls)\n- Ability to evaluate, select, and implement security tools across cloud and on-premise environments\n- Strong understanding of network security principles, including firewalls, VPNs, and network segmentation\n- Deep understanding of encryption mechanisms, particularly asymmetric cryptography and certificate hierarchies (PKI)\n- Ability to secure communication paths and data flows across distributed systems\n- Experience supporting audits and security policy reviews\n- Awareness of the responsibilities associated with operating in critical infrastructure environments\n- Extensive experience operating and scaling GitLab in large environments\n- Design and operation of highly available GitLab architectures (e.g. backup\u002Frestore strategies)\n- Experience managing large-scale CI workloads\n- Strong understanding of access control, and project\u002Fgroup governance in GitLab\n- Proven ability to ensure performance, reliability, and compliance of GitLab as a shared platform service\n- Experience working with supporting tools and platforms such as:\n- PostgreSQL\n- TestRail\n- Jira","en","178520","https:\u002F\u002Fwww.westhouse-group.com\u002Fen\u002Fjoblisting\u002Fci-cd-engineer-m-f-d-frankfurt-50-and-remote\u002F",{"items":42},[43,60,75,92,110],{"id":44,"slug":45,"title":46,"skills":47,"budget":26,"duration":26,"location":57,"onsitePercent":29,"contractType":30,"foundAt":58,"category":59},4913,"devops-cloud-coach-fuer-entwicklungsteams-mwd","DevOps & Cloud Coach für Entwicklungsteams (m\u002Fw\u002Fd)",[11,48,10,8,9,49,50,51,52,53,54,55,56],"OpenShift","Jenkins","GitLab CI\u002FCD","Helm","WebSphere","Cloud","Migration","Confluence","MS Teams","Dortmund","2026-05-20T18:25:25+00:00",{"id":33,"slug":34,"label":35},{"id":61,"slug":62,"title":63,"skills":64,"budget":26,"duration":71,"location":26,"onsitePercent":72,"contractType":30,"foundAt":73,"category":74},4877,"azure-cloud-administrator-remote","Azure Cloud Administrator - Remote",[65,66,67,68,69,70],"Azure","Cloud Infrastructure","Active Directory","VPN","Netzwerk-Administration","Server-Management","4 Monate++",0,"2026-05-20T14:30:18+00:00",{"id":33,"slug":34,"label":35},{"id":76,"slug":77,"title":78,"skills":79,"budget":26,"duration":26,"location":88,"onsitePercent":89,"contractType":30,"foundAt":90,"category":91},4839,"migration-weiterentwicklung-einer-postgresql-plattform-in-openshift","Migration & Weiterentwicklung einer PostgreSQL-Plattform in OpenShift",[80,10,81,82,83,84,85,86,87],"Red Hat OpenShift","PostgreSQL","Crunchy PostgreSQL Operator","CloudNativePG","Bash","Python","Lifecycle-Management","Projektmanagement","Hannover",100,"2026-05-20T13:25:48+00:00",{"id":33,"slug":34,"label":35},{"id":93,"slug":94,"title":95,"skills":96,"budget":26,"duration":26,"location":26,"onsitePercent":72,"contractType":30,"foundAt":108,"category":109},4833,"senior-backstage-architect-technical-lead-idp-nearshore-mfd","Senior Backstage Architect & Technical Lead (IDP) - Nearshore (m\u002Ff\u002Fd)",[97,10,51,8,98,99,100,13,101,102,103,12,104,105,106,107],"Backstage","REST","GraphQL","Git","Platform engineering","Infrastructure","Internal Developer Platforms","Atlantis","Azure AD","Okta","SSO","2026-05-20T13:21:01+00:00",{"id":33,"slug":34,"label":35},{"id":111,"slug":112,"title":113,"skills":114,"budget":120,"duration":121,"location":122,"onsitePercent":29,"contractType":30,"foundAt":123,"category":124},4809,"aws-cloud-engineer-mwd-6-monate-wienremote-asap","AWS Cloud Engineer (m\u002Fw\u002Fd) - 6 Monate+ - Wien\u002FRemote - ASAP",[115,8,10,11,116,12,117,118,119],"AWS","Infrastructure as Code","CI\u002FCD-Pipelines","Monitoring","Troubleshooting","Negotiable","6+ Monate","Wien","2026-05-20T12:26:00+00:00",{"id":33,"slug":34,"label":35}]