
location_onWashington Street, Downtown, Providence, Providence County, Rhode Island, 02902, United States
Maximus Technology and Consulting Services (TCS) delivers critical solutions to government and commercial clients, focusing on secure, reliable, and scalable infrastructure. This role sits within a specialized team dedicated to DevSecOps, where the mission is to integrate security practices directly into the development lifecycle. The team ensures the resilience of network infrastructure and cloud environments, supporting high-stakes operations that require strict adherence to compliance and security standards.
This position serves as a pivotal link between development, security, and operations. You will be responsible for orchestrating incident response, vulnerability management, and compliance efforts across complex network environments. The role involves designing and implementing automated security frameworks to replace manual processes, ensuring that deployment tools and infrastructure are both robust and secure.
In your day-to-day, you will manage end-user and administrative access controls, conduct risk assessments, and maintain critical systems such as proxy servers, firewalls, and cloud platforms. A significant portion of your time will be dedicated to performing penetration testing, security code reviews, and analyzing network traffic to diagnose root causes of security incidents. You will also drive the adoption of automation using scripting languages and open-source solutions to streamline security operational processes and patch management.
Candidates selected for this role must possess an active Top Secret with SCI eligibility. The interview process typically involves a technical deep-dive into your experience with DevSecOps, cloud security, and automation tools, followed by a review of your ability to navigate complex security frameworks. Final selection includes a verification of your security clearance and relevant certifications.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to fostering a diverse and inclusive workplace where all employees can thrive.
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process, including accessing job postings, completing assessments, or participating in interviews, please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
Washington Street, Downtown, Providence, Providence County, Rhode Island, 02902, United States
Providence, Rhode Island
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.