What is your current level of experience in freelance work?
Kubernetes SRE - Vulnerability Management & Automation Specialist Job Overview Looking for an experienced Kubernetes SRE to join our team for ongoing vulnerability management and automation development. This is a monthly recurring contract focused on maintaining security posture across enterprise Kubernetes environments through systematic CVE remediation and deployment automation. Duration: Long-term monthly engagement (6+ months) Hours: 15-25 hours per week Budget: Fixed monthly rate Start Date: Immediate What You'll Be Doing Core Responsibilities - Docker Image Updates: Remediate CVEs by updating base images and migrating to Chainguard/distroless variants - Helm Chart Management: Maintain upstream charts, update dependencies, and ensure compatibility - Deployment Automation: Execute staged deployments following GitOps workflows - CVE Remediation: Address vulnerabilities within SLA timelines (Critical: 24-48hrs, High: 7 days, Medium: 30 days) Automation Development - Build scripts for automated repository synchronization - Develop deployment validation and rollback procedures - Create Slack integration for status notifications - Implement vulnerability scanning workflows Monthly Deliverables - Vulnerability remediation reports - Updated Docker images and Helm charts - Deployment status summaries - Automation tooling and documentation Required Skills & Experience Must-Have Technical Skills - Kubernetes Expert: 3+ years managing production K8s clusters - Helm Proficiency: Advanced experience with chart development and maintenance - Docker/Container Security: Image scanning, vulnerability remediation, and base image optimization - GitLab/Git: Repository management, CI/CD pipelines, and GitOps workflows - Linux/Bash Scripting: Automation development and system administration Container & Security Experience - CVE Management: Experience with vulnerability scanning tools (Trivy, Snyk, Twistlock, etc.) - Image Hardening: Migration to distroless, Alpine, or Chainguard images - Security Best Practices: Container security, RBAC, network policies - Deployment Strategies: Blue/green, canary, rolling updates Automation & DevOps - Infrastructure as Code: Terraform, Ansible experience preferred - CI/CD Platforms: GitLab CI, Jenkins, or similar - Monitoring: Prometheus, Grafana, or equivalent - Scripting Languages: Python, Bash, Go Preferred Qualifications Additional Experience - Cloud Platforms/Systems: AWS, Kubernetes - Compliance: SOC2, PCI-DSS, or similar security frameworks Soft Skills - Self-Directed: Ability to work independently with minimal oversight - Communication: Clear status reporting and documentation - Problem-Solving: Troubleshooting complex distributed systems - Time Management: Meeting SLA deadlines consistently Project Structure Monthly Workflow Week 1: CVE assessment and critical/high priority remediation Week 2-3: Planned updates, chart maintenance, and automation development Week 4: Testing, validation, and next month preparation Working Relationship - Kickoff Meetings: Monthly planning and priority setting - Progress Updates: Weekly status calls and Slack communication - Knowledge Sharing: Collaboration with Consultant Manager for automation handoff What We Provide Environment Context - GitLab repository insights - Vulnerability management report - Slack workspace for communication Success Metrics Primary KPIs - Zero Overdue CVEs: All vulnerabilities addressed within SLA - Deployment Success Rate: Greater than 95% successful deployments - Automation Coverage: Progressive reduction in manual tasks - Reduce Toil: Provide distroless/chainguard and upstream helm chart updates to reduce recurring VM toil Quality Standards - Documentation: All processes and tools properly documented - Testing: Comprehensive validation in staging before production - Communication: Proactive status updates and issue escalation How to Apply Application Requirements Please include in your proposal: 1. Relevant Experience: Specific examples of Kubernetes CVE management projects 2. Technical Approach: How you would tackle vulnerability management automation 3. Tool Expertise: Your experience with container scanning and remediation tools 4. Availability: Confirmation of 15-25 hours/week availability for ongoing engagement 5. Portfolio: Links to relevant GitHub repos or case studies (anonymized if needed) Screening Questions - How do you typically approach CVE prioritization in Kubernetes environments? - What's your experience with Helm chart dependency management? - Describe your process for testing container image updates before production deployment - What automation tools would you recommend for vulnerability management workflows? Interview Process - Technical Discussion: Review approach to vulnerability management - Hands-On Assessment: Live problem-solving with Kubernetes scenarios - Project Planning: Discuss automation roadmap and deliverables --- Ready to help us maintain a secure, automated Kubernetes platform? We're looking for someone who can take ownership of our vulnerability management process while building the automation to make it scalable. If you have the Kubernetes expertise and security mindset we need, we'd love to hear from you.