Vulnerability & Linux Security Engineer
5+ years securing enterprise infrastructure — automating vulnerability remediation, hardening Linux systems to CIS/NIST standards, and deploying resilience at scale across AWS, Azure, and GCP.
I'm a Vulnerability & Linux Security Engineer specializing in automating security operations across hybrid cloud environments. At Alvaria, I led the full vulnerability management lifecycle — from scan to remediation — across hundreds of Linux servers using Tenable, Splunk, and Ansible.
I build the automated pipelines that fix problems, not just find them. My Ansible playbooks enforce CIS Benchmark Level 2 and NIST 800-53 baselines with near-zero manual intervention, cutting exposure windows and eliminating recurring audit findings.
I bring Chaos Engineering expertise — using Gremlin and AWS FIS to simulate failure scenarios and validate auto-remediation workflows before incidents happen. A capability most engineers don't have.
Based in Watervliet, Michigan. 100% remote. No sponsorship required.
Managed VM operations across 500+ Linux servers — reduced MTTD on critical CVEs by 40%+ with Tenable + Ansible automated pipelines.
Engineered Ansible roles enforcing CIS Benchmark Level 2 and NIST 800-53 — eliminated recurring findings in quarterly security audits.
Designs failure injection scenarios and validates auto-remediation under controlled conditions before they're ever needed in production.
AWS Solutions Architect + GCP Professional Cloud Architect + Azure Fundamentals — fluent across all three major cloud platforms.
Automated malware scanning pipeline across Linux server fleets using rkhunter, chkrootkit, and ClamAV, with centralized reporting built for enterprise-scale deployment.
Comprehensive CIS/NIST-aligned Ansible hardening playbook for RHEL servers — SSH lockdown, kernel tuning, auditd configuration, and SELinux policy enforcement.
Terraform-deployed AWS Fault Injection Service experiment simulating EC2 failures to validate auto-remediation workflows and measure resilience under controlled conditions.
Automated patch management for RHEL servers — compliance scans, yum updates, structured audit logging, and automated email reporting for full traceability.
Actively seeking remote Vulnerability Engineer and Linux Security Engineer roles. If you're hiring or want to connect, reach out directly.
Send a Message