Role Type: 100% Hands-On Engineering (No Management)
Job Scope
We are seeking a deeply technical, hands-on Senior DevOps & Elastic Stack Engineer with the expertise to design, rebuild, optimise, and troubleshoot complex infrastructure inside a secure Defence environment.
This is not a coordination, oversight, or team-lead role.
This is a do-it-yourself engineering position -writing Ansible, building GitLab pipelines, designing Logstash flows, tuning Elasticsearch clusters, and fixing broken infra with your own hands.
If you are not someone who thrives on deep troubleshooting, architecture-through-implementation, and technical craftsmanship, this role will not be a good fit.
Job Responsibilities
1. Ansible Automation – Architect, Build & Optimise
- Write advanced Ansible playbooks, roles, modules, filters, and dynamic inventories.
- Refactor legacy automation, remove technical debt, and implement best practices.
- Implement CI linting, automated testing, and fully automated provisioning workflows.
2. GitLab Enterprise CI/CD – End-to-End Pipeline Engineering
- Architect and build complete CI/CD pipelines—including infra automation—on GitLab Enterprise.
- Configure runners, caching, secrets, governance, SSH keys, and access controls.
- Rewrite outdated pipelines into robust, modularised stages and jobs.
- Integrate security scans, IaC validation, and environment automation.
3. Elastic Stack Engineering – Ingestion, Performance & Visualisation
- Build and tune high-throughput Logstash ingestion pipelines.
- Optimise Elasticsearch clusters (shards, ILM, retention, snapshots, indices).
- Develop dashboards, alerts, and monitoring using Kibana.
- Diagnose and resolve ingestion bottlenecks and cluster performance issues.
4. Infrastructure Engineering & Troubleshooting
- Deep Linux (RHEL) engineering across services, networking, systemd, and logging.
- Investigate and resolve pipeline failures, deployment issues, and log-routing problems.
- Implement robust monitoring, telemetry, and automated self-recovery mechanisms.
- Operate with an SRE mindset—reduce MTTR, increase system resilience, automate relentlessly.
5. Defence-Grade Security Engineering
- Apply hardening standards directly in pipelines, configurations, and infra definitions.
- Manage secrets, RBAC, privileged access, and audit logging across CI/CD and Elastic.
- Build compliant, fully traceable infrastructure pipelines aligned with Defence controls.
Must-Have Expertise
- Relevant 9-12 years’ experience
- Expert-level Ansible (custom modules, complex inventories, reusable roles).
- Advanced GitLab Enterprise CI/CD—can architect and build pipelines independently.
- Deep hands-on Elastic Stack experience (Elasticsearch, Logstash, Kibana).
- Proven ability to build & tune Logstash ingestion pipelines end-to-end.
- Strong Linux (RHEL), networking, shell scripting, and troubleshooting skills.
- Experience engineering automation in secure / regulated environments.
- Ability to operate independently, take ownership, and deliver complex technical rebuilds.
Who Will Thrive
- Someone who can open Vim/VSCode and start fixing things immediately.
- Someone who enjoys rewriting and improving automation the right way.
- Someone highly technical—not managerial—who loves building.
- Someone comfortable working in restricted, high-security Defence environments.
Preferred (Not Mandatory)
- Terraform or other IaC tools
- Kubernetes / container-based logging pipelines
- SRE observability frameworks
- Prior Defence or GovTech experience
Why This Role Matters
You will rebuild the automation backbone for a major Defence portfolio.
Your work will transform fragmented systems into a stable, predictable, automated infrastructure foundation.
This is a high-impact role for an engineer who wants to get their hands dirty and build something that truly matters.