
location_onLarson Drive, Lincoln, Bonneville County, Idaho, 83401, United States
Maximus Technology and Consulting Services (TCS) operates at the intersection of advanced technology and critical national security. Our team is dedicated to securing complex cloud environments and ensuring the reliability of mission-critical systems for the United States Air Force. We leverage cutting-edge automation, DevSecOps practices, and robust security frameworks to protect sensitive data and maintain operational continuity in high-stakes environments.
This position serves as a pivotal link between development, security, and operations. You will be responsible for designing and implementing automated security frameworks that strengthen deployment tools and processes. The role demands a proactive approach to incident response, vulnerability management, and compliance, ensuring that network infrastructure and security operational processes are resilient and efficient.
In this capacity, you will move beyond manual tasks by developing scripts and leveraging open-source solutions to automate security testing, patching, and access control. Your day-to-day involves diagnosing root causes of security issues, conducting risk assessments, and maintaining the integrity of proxy servers, firewalls, and systems. You will also play a key role in fostering a culture of security awareness, guiding users on the effective use of application security features while staying ahead of technology trends in cloud site reliability engineering.
Candidates selected for this role must possess an active Top Secret with SCI eligibility. The recruitment process includes a thorough review of qualifications, followed by interviews focused on technical expertise in DevSecOps, cloud security, and automation. Successful candidates will be evaluated on their ability to design secure, automated solutions and their understanding of USAF IT systems.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to fostering an inclusive environment where diverse backgrounds and perspectives drive innovation.
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process—including accessing job postings, completing assessments, or participating in interviews—please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
Larson Drive, Lincoln, Bonneville County, Idaho, 83401, United States
Lincoln, Idaho
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.