DevSecOps InternAt — GenRocket, Inc.
Opportunity Summary
Focus on DevOps with AWS and Terraform to secure and scale our multi-tenant and single-tenant infrastructure. To be included in the discussion and strategy of our AI development.
Tasks:
Hardavi will be supervised to perform many of the duties of a DevSecOps Engineer, overseen by the DevOps team lead, including many of the following tasks:
- AWS Ecosystem Management
- Deploy and manage services in AWS.
- Optimize cost, scalability, availability, and security across AWS accounts.
- Apply tagging policies, IAM best practices, and cross-account access patterns.
- Containerization & Orchestration with Docker & ECS
- Build and maintain Docker images, optimize Dockerfiles.
- Set up ECS services/tasks, load balancers, and auto-scaling policies.
- Monitor ECS workloads and troubleshoot container lifecycle issues.
- Log Management & Tracing (CloudWatch, Datadog)
- Aggregate logs from ECS, Lambda, EC2, and other services into CloudWatch and/or Datadog.
- Set up log-based metrics and anomaly detection.
- Implement distributed tracing where applicable.
- Security Tooling & Governance
- Use AWS Security Hub and Inspector to detect misconfigurations, vulnerabilities, and compliance violations.
- Respond to findings and automate remediation pipelines where appropriate.
- Support secure secrets management (e.g., SSM Parameter Store, Secrets Manager).
- Role-Based Access Control & Policy Enforcement
- Manage IAM roles, policies, and least-privilege access models for services and users.
- Implement guardrails using tools like SCPs, Config Rules, or automated checks in CI/CD.
- Collaboration & Documentation
- Work closely with developers, SREs, and security teams to streamline delivery processes.
- Write and maintain technical documentation, runbooks, and onboarding guides.
- Incident Management & Root Cause Analysis
- Participate in on-call rotations if required.
- Use observability and audit data to investigate incidents and identify long-term fixes.
- Vulnerability Management (Amazon Inspector + OS/Container Scanning)
- Use Amazon Inspector for:
- Continuous vulnerability scanning of EC2 instances and container images in Amazon ECR.
- Real-time CVE detection based on installed software or base images.
- Integrate Inspector findings into dashboards and reports for tracking vulnerabilities.
- Prioritize remediation based on CVSS score, exploitability, and business impact.
- Automate patching via SSM Patch Manager or custom automation pipelines.
- Use Amazon Inspector for:
- Cloud Custodian (Policy-as-Code Enforcement)
- Implement Cloud Custodian to enforce security, cost, and tagging policies at scale.
- E.g., automatically delete untagged or non-compliant resources.
- Enforce encryption on S3, RDS, and EBS volumes.
- Terminate instances or revoke access keys based on age or inactivity.
- Schedule Custodian policies via AWS Lambda or EventBridge for continuous compliance.
- Integrate policy execution results into Slack, CloudWatch, or SIEM tools for visibility.
Training:
* Weekly scheduled one-on-one time with the CTO
* Daily scheduled time supervised by DevOps Leader
* Full hands-on tasks and assignments given by DevOps Leader
* Monthly progress reviews and check-ins with HR
* Inclusion in GenRocket Company Quarterly review and Monthly townhall meetings
Learning Outcome:
- Deploy and secure AWS infrastructure across multi-account environments with IAM and tagging best practices.
- Build and optimize Docker containers; configure ECS services with load balancers, auto-scaling, and lifecycle monitoring.
- Enable distributed tracing for ECS and Lambda. Configure log-based metrics, alarms, and anomaly detection for faster incident response.
- Integrate distributed tracing techniques to pinpoint performance bottlenecks in microservices.
- Automate vulnerability scanning and remediation using Amazon Inspector, SSM Patch Manager, and CI/CD pipelines.
- Enforce least-privilege IAM access and policy-as-code with Cloud Custodian, SCPs, and Config Rules.
- Collaborate with SREs and developers; author runbooks and handle incident response using observability and audit tools.
Program
Academic Internship
Location Type
Remote
This opportunity provides some form of compensation
No
Opportunity Availability
08/13/2025 to 12/19/2025