
location_onMount Avenue, Rose Park, Missoula, Missoula County, Montana, 59801, United States
Maximus Technology and Consulting Services (TCS) delivers critical solutions to government and commercial clients, focusing on secure, reliable, and scalable infrastructure. This role sits within a specialized team dedicated to maintaining the integrity of high-security environments, ensuring that DevSecOps practices align with rigorous federal standards and operational continuity.
As a DevSecOps Engineer, you will serve as a pivotal link between development, security, and operations. Your mission is to fortify the organization's security posture by implementing automated frameworks, managing vulnerability lifecycles, and ensuring seamless compliance across network and cloud infrastructures. You will not only troubleshoot complex security incidents but also proactively design solutions that replace manual processes with robust automation.
In this position, you will collaborate with cross-functional teams to build secure deployment pipelines and manage access controls for sensitive systems. Your day-to-day involves conducting risk assessments, performing penetration testing, and analyzing network traffic to identify and remediate threats. You will be responsible for maintaining the operational health of proxy servers, firewalls, and security tooling, ensuring that the infrastructure remains resilient against evolving cyber threats.
Candidates selected for this role must possess an active Top Secret with SCI eligibility. The interview process typically includes a technical assessment of your security and automation expertise, followed by a review of your ability to navigate complex government IT environments. Successful candidates will be invited to discuss their approach to risk management and automation strategy with the hiring team.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to fostering a diverse and inclusive workplace where all employees can thrive.
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process—including accessing job postings, completing assessments, or participating in interviews—please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
Mount Avenue, Rose Park, Missoula, Missoula County, Montana, 59801, United States
Missoula, Montana
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.