
location_onDulles Access Road, Tysons, Fairfax County, Virginia, 22103, United States
Maximus Technology and Consulting Services (TCS) delivers critical solutions to government and commercial clients, focusing on secure, reliable, and scalable infrastructure. This role sits within a specialized team dedicated to advancing DevSecOps practices, ensuring that security is embedded into every stage of the development and operations lifecycle.
You will serve as a pivotal link between development, security, and operations, driving the automation of security frameworks and the modernization of network infrastructure. This position exists to transform manual security processes into robust, automated workflows that enhance deployment speed without compromising safety.
In this role, you will design and implement solutions for incident response, vulnerability management, and compliance. Your day-to-day involves collaborating with cross-functional teams to build automated security testing tools, managing access controls, and conducting risk assessments on proxy servers and firewalls. You will also lead penetration testing efforts, perform security code reviews, and maintain comprehensive runbooks to prevent recurring operational issues. The role requires a deep understanding of cloud site reliability engineering and the ability to troubleshoot complex network and security challenges using advanced monitoring and analytics tools.
Candidates selected for this position will undergo a rigorous vetting process, including a review of technical qualifications and a security clearance verification. The interview process typically involves technical assessments to validate expertise in automation, cloud platforms, and security protocols, followed by team fit discussions. Successful candidates must be eligible for an Active Top Secret with SCI clearance.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to fostering an inclusive environment where diverse perspectives drive innovation.
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process—including accessing job postings, completing assessments, or participating in interviews—please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
Dulles Access Road, Tysons, Fairfax County, Virginia, 22103, United States
Tysons, Virginia
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.