
location_on622, Washington Boulevard, Strawberry Hill, Northeast, Kansas City, Wyandotte County, Kansas, 66101, United States
As a DevSecOps Engineer within Maximus Technology and Consulting Services, you will serve as a critical guardian of our security posture and operational resilience. This role exists to bridge the gap between development, security, and operations, ensuring that our infrastructure is not only robust but also compliant with stringent government standards. You will be at the forefront of implementing automated security frameworks, managing incident responses, and driving the adoption of best practices in cloud site reliability engineering.
Your day-to-day involves a dynamic blend of proactive defense and reactive problem-solving. You will design and implement solutions for network security issues, manage access controls, and coordinate remediation patching efforts. By leveraging scripting languages and open-source solutions, you will automate security testing tools and replace manual tasks with efficient, scalable processes. From conducting penetration tests and security code reviews to maintaining runbooks that prevent recurring issues, your work ensures the continuous integrity of our systems.
Candidates selected for this position will undergo a rigorous evaluation process designed to assess both technical expertise and cultural fit. The journey typically includes an initial screening to verify qualifications and clearance status, followed by technical interviews focusing on DevSecOps methodologies, automation strategies, and security architecture. Final stages involve a deep-dive discussion with the hiring team to evaluate problem-solving skills and alignment with our mission.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to fostering a diverse and inclusive environment where every team member can contribute their unique perspective.
Maximus is dedicated to providing reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage—including accessing job postings, completing assessments, or participating in interviews—please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
622, Washington Boulevard, Strawberry Hill, Northeast, Kansas City, Wyandotte County, Kansas, 66101, United States
Kansas City, Kansas
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.