Amanda Wong
Senior DevSecOps Engineer
[email protected] | +1 (503) 456-7890 | linkedin.com/in/amanda-wong-devsecops | github.com/awongdevsecops | amanda-wong.dev | San Francisco, CA
Professional Summary
Senior DevSecOps Engineer with over 5 years of experience in integrating security practices into continuous integration and delivery pipelines. Successfully implemented a real-time threat detection system using AWS Lambda and CloudWatch, significantly reducing the mean time to detect threats from weeks to minutes. Proficient in Kubernetes, Jenkins, and CI/CD tools, ensuring seamless deployment processes and robust application security.
Work Experience
Senior DevSecOps Engineer
01/2022
Tech Company Inc
San Francisco, CA
•
Led the integration of a real-time threat detection system using AWS Lambda and CloudWatch, reducing mean time to detect threats from days to minutes.
•
Implemented automated code reviews and security checks in Jenkins pipelines, identifying a significant percentage of vulnerabilities before commit.
•
Optimized CI/CD pipelines, reducing build times and improving developer productivity.
•
Deployed Kubernetes-based infrastructure for containerized applications, handling 2M requests/day with high availability.
DevSecOps Engineer
06/2020 - 12/2021
Previous Company Inc
San Francisco, CA
•
Automated security audits for all production environments, reducing manual audit time by 70%.
•
Configured and maintained AWS CloudTrail for audit logs, enhancing compliance with GDPR and CCPA by 100%.
DevSecOps Engineer
02/2019 - 05/2020
Startup Innovations Ltd
San Francisco, CA
•
Created and maintained infrastructure as code using Terraform, ensuring consistent deployment across environments.
•
Developed and implemented automated backups for critical databases, reducing data loss risks by 90%.
Skills
Python, JavaScript, React, Node.js, Docker, AWS CloudFormation, Jenkins, Kubernetes
Education
Bachelor of Science in Computer Engineering
09/2018 - 05/2024
University of California, San Diego
San Francisco, CA
Projects
Personal Threat Detection System
github.com/awongdevsecops/personal-threat-detection-system
Developed a personal cloud-based threat detection system using AWS services to monitor my GitHub repositories for security vulnerabilities and compliance issues.
DevSecOps Automation Scripting
Created an open-source scripting tool that automates the setup of secure CI/CD pipelines using Jenkins and Docker, with documentation on best practices for DevSecOps.
Certifications
Certified Kubernetes Security Specialist
06/2025
AWS Certified Security - Specialty
10/2024
Create a professional, optimized resume in minutes. No design skills needed—just proven results.
Loading template...
Loading template...
This professional template is designed to highlight the key elements that an ATS (Applicant Tracking System) looks for in a resume for a DevSecOps Engineer position. It includes relevant keywords such as 'DevSecOps engineer', 'security integration', and 'continuous delivery pipelines' which are crucial for both human readers and ATS algorithms. The structure of the resume, with clear sections like Summary, Skills, Experience, Education, and Certifications, ensures that each section is easily scannable by an ATS while also being informative to potential employers. Furthermore, the inclusion of specific achievements and metrics related to security improvements or efficiency gains in CI/CD processes provides concrete evidence of Amanda's expertise and impact, which makes her resume stand out among other candidates.
Want to know how your Senior DevSecOps Engineer resume performs? Use our free ATS Resume Score tool to get instant feedback on your resume's ATS compatibility for Senior DevSecOps Engineer positions. Upload your resume below and receive detailed analysis with actionable recommendations to improve your chances of landing interviews.
Instant ATS-friendly analysis with recruiter-ready suggestions to land 2x more interviews. No signup required for basic score.
Import your profile to unlock automated fixes, personalized career tips, and smart job matching.
or click to browse files
Supports PDF and DOCX • Max 20MB
Expert guidelines and best practices for each section of your resume.
First Name Last Name City, State, Zip Code Phone Number | Email Address LinkedIn Profile URL | Portfolio URL (Optional)
Your contact information is the first section recruiters see. Keep it concise and professional. Ensure your email address is appropriate (e.g., [email protected]). Include your LinkedIn profile for a comprehensive view of your professional journey. A portfolio or personal website is recommended for creative, technical, or design roles.
Do not include your full physical address (street number/name) for privacy reasons. Avoid including personal details like marital status, age, photo, or social security number unless specifically required in your country. Don't use unprofessional email addresses.
See clear examples of how to format contact details effectively.
John Doe 1234 Random St, Apt 56 New York, NY 10001 [email protected] github.com/aliciacode Single, 28 years old
John Doe New York, NY (555) 123-4567 | [email protected] linkedin.com/in/johndoe | github.com/johndoe | johndoe.dev
Professional Title Result-oriented [Role Name] with [Number] years of experience in [Key Skills/Industries]. Proven track record of [Major Achievement]. Skilled in [Key Technologies/Skills]. Committed to delivering [Specific Value] for [Target Industry/Company type].
A professional summary is your elevator pitch. It should be 3-5 sentences long, summarizing your experience, key skills, and major achievements. Tailor it to the job description by using relevant keywords. Focus on what makes you unique and the value you bring to potential employers.
Avoid generic objectives like 'Looking for a challenging role to grow my skills.' Recruiters want to know what value you bring to them, not what you want from them. Don't use first-person pronouns (I, me, my). Keep it concise and impactful.
Compare a weak objective with a strong professional summary.
Objective: I am a hard-working individual looking for a DevSecOps Engineer position where I can learn new things and advance my career.
Senior DevSecOps Engineer with 6+ years of experience in integrating security practices into the software development lifecycle. Reduced mean time to detect threats from days to minutes by implementing real-time threat detection systems using AWS Lambda and CloudWatch. Proficient in Kubernetes, Jenkins, and CI/CD tools, ensuring seamless deployment processes and robust application security.
Showcase achievements instead of generic statements.
Objective: Seeking a DevSecOps Engineer position to expand my knowledge in cloud technologies while contributing to the company's success.
Senior DevSecOps Engineer with over 5 years of experience driving continuous integration and delivery processes. Led the development of automated security checks, reducing vulnerabilities by 90% before code commits. Expertise in AWS Security Hub and Kubernetes.
Highlight specific technical skills.
Objective: Looking for a DevSecOps Engineer position to enhance my skills in automation tools such as Jenkins and Ansible.
Senior DevSecOps Engineer with 7+ years of hands-on experience in integrating secure coding practices into the software development lifecycle. Managed CI/CD pipelines, reduced build times by 50%, and implemented automated security audits using AWS CloudTrail.
Include measurable outcomes.
Objective: Aiming to join a DevSecOps team where I can contribute my experience in secure software development practices.
Senior DevSecOps Engineer with extensive experience in automating security measures and compliance checks. Decreased vulnerability detection time by 40% through real-time threat monitoring systems. Skilled in deploying Kubernetes-based infrastructure for high-availability services.
Focus on strategic vision.
Objective: Aspiring to work as a DevSecOps Engineer, where I can leverage my technical background and leadership skills to drive innovation and security compliance in the tech industry.
Certified DevSecOps Specialist with over 4 years of experience in managing cloud security tools and ensuring regulatory compliance. Spearheaded the integration of OWASP guidelines into CI/CD pipelines, improving code quality and reducing remediation costs.
Technical Skills - Languages: [List] - Frameworks: [List] - Tools: [List] Soft Skills - [Skill 1], [Skill 2], [Skill 3]
Group your skills logically (e.g., Languages, Frameworks, Tools). Focus on hard skills relevant to the job. List skills in order of proficiency or relevance. Soft skills are better demonstrated through bullet points in your experience section rather than a bare list.
Do not list skills you are not comfortable using in an interview. Avoid using progress bars or percentages to rate your skills (e.g., "Java: 80%") as they are subjective and often misinterpreted. Don't include outdated technologies unless specifically required.
Practical example showing do's and don'ts for skills
Java: 75%, Python: Beginner, Jenkins: Intermediate
Python, Java, Jenkins
Languages: C++, Ruby; Frameworks: React.js, Django; Soft Skills: Leadership, Communication, Problem Solving
Languages: C++, Ruby - Frameworks: React.js, Django
Job Title | Company Name | Location Month Year – Month Year - Action Verb + Context + Result (Quantified) - Led [Project] resulting in [Outcome]... - Collaborated with [Team] to implement [Feature]...
This is the core of your resume. Use reverse-chronological order (most recent first). Start each bullet with a strong action verb. Focus on achievements and impact, not just duties. Use numbers to quantify your impact (dollars, percentages, time saved, users affected). Show progression and increasing responsibility.
Avoid passive language like "Responsible for..." or "Tasked with...." Don't list every single daily task; focus on significant contributions and measurable outcomes. Avoid jargon that recruiters outside your field won't understand.
Practical example showing do's and don'ts for experiences
Implemented security measures in code reviews, but no specific results or metrics provided.
Led a team to integrate automated security checks into Jenkins pipelines, identifying 95% of vulnerabilities before commit.
Responsible for maintaining AWS CloudFormation templates, no impact stated.
Configured and maintained AWS CloudTrail for audit logs, enhancing compliance with GDPR and CCPA by 100%.
Degree Name | University Name | Location Month Year – Month Year - Relevant Coursework: [Course 1], [Course 2] - Honors/Awards: [Award Name] - GPA: X.X (if above 3.5)
List your highest degree first. If you have significant work experience, keep the education section brief. Include your GPA only if it is above 3.5 or if you are a recent graduate. Highlight relevant coursework, academic projects, honors, or leadership roles.
Do not include high school details if you have a college degree. Avoid listing every single course you took; select only the most relevant ones. Don't include graduation dates from decades ago if age discrimination is a concern in your field.
Practical example showing do's and don'ts for educations
Bachelor of Arts | University of XYZ | New York, NY September 2014 – May 2018 - Relevant Coursework: Introduction to Programming, Calculus I & II, Art History
Bachelor of Science in Computer Engineering | University of California, San Diego | San Francisco, CA September 2018 – May 2024 - Relevant Coursework: Cybersecurity Fundamentals, Software Development Practices, DevOps Tools and Techniques - Honors/Awards: Dean’s List (Fall 2022) - GPA: 3.9
Project Name | Technologies Used - Briefly describe what you built and its purpose - Highlight a specific technical challenge you solved - Link to GitHub or live demo if available
Projects are excellent for demonstrating practical skills, especially if you lack work experience or are changing careers. Include a link to the GitHub repo or live demo if possible. Focus on projects that show problem-solving skills and relevant technologies for the target role.
Don't include trivial tutorials unless you significantly expanded on them. Avoid projects that are outdated, incomplete, or irrelevant to the role you're applying for. Don't just list technologies—explain what you built and why it matters.
Practical example showing do's and don'ts for projects
Created a simple Jenkins pipeline tutorial using default plugins, which only demonstrates basic setup steps. The project is outdated and not extended beyond the initial configuration.
Developed an advanced CI/CD pipeline with Jenkins that integrates automated security checks (OWASP ZAP) to detect vulnerabilities in code commits before merging. Demonstrated how to extend Jenkins pipelines for continuous compliance by integrating OWASP tools, reducing human error.
Another practical example illustrating best practices
Implemented Docker Swarm with minimal features and did not address any specific security or operational challenges.
Configured a secure multi-node Docker Swarm cluster that automatically scales based on load, implemented Kubernetes for seamless deployment of containerized applications across multiple environments. Highlighted how to configure both systems to handle 2M requests/day while ensuring high availability and robust security.
Best practices for showcasing DevSecOps capabilities
Developed a basic Ansible playbook with no specific use case or challenge beyond setting up a simple environment.
Built an Ansible playbook that automates the setup of secure CI/CD environments, including role-based access control and integration with cloud services like AWS S3 for artifact storage. Documented how to enforce security policies while streamlining operational efficiency.
Highlighting problem-solving in DevSecOps projects
Created a simple Terraform script that only deploys basic infrastructure without addressing any advanced configuration or real-world challenges.
Designed and implemented an Infrastructure as Code (IaC) solution using Terraform to deploy a scalable, fault-tolerant web application with automated backups. Addressed security concerns by integrating AWS CloudTrail for audit logs and IAM policies for least privilege access.
Common questions about this role and how to best present it on your resume.
Essential skills include knowledge of CI/CD pipelines, security tools and practices like SAST/DAST, and automation scripting.
Highlight transferable skills and adaptability. Emphasize recent projects that align with the job requirements.
Key tools include Jenkins, Docker, Kubernetes, AWS or Azure security services, and Splunk for logging.
Include examples of integrating static code analysis tools into CI/CD pipelines and conducting regular security audits.
Understanding cloud security best practices ensures compliance, reduces vulnerabilities, and optimizes resource usage in multi-cloud environments.
Create a professional, optimized resume in minutes. No design skills needed—just proven results.
The average job seeker spends 3+ hours formatting a resume. Our AI does it in under 15 minutes, getting you to the application phase 12x faster.