
location_onHector International Airport, Joe Parmer Boulevard, Fargo, Cass County, North Dakota, 58105, United States
Maximus Technology and Consulting Services (TCS) operates at the intersection of advanced technology and critical national security. Our team is dedicated to securing the infrastructure that powers essential government operations, ensuring resilience against evolving cyber threats while maintaining the highest standards of compliance and reliability.
As a DevSecOps Engineer within our TCS division, you will serve as a guardian of our security posture, bridging the gap between development, security, and operations. This role is designed to automate and harden our deployment pipelines, transforming manual security processes into robust, scalable frameworks. You will be the driving force behind our incident response strategies, vulnerability management, and the implementation of automated security testing tools.
Your day-to-day involves designing and executing risk assessments for proxy servers, firewalls, and critical systems. You will collaborate with cross-functional teams to replace manual tasks with intelligent automation, leveraging scripting languages and open-source solutions to enhance network security. From conducting penetration tests and security code reviews to managing end-user access controls, you will ensure that our infrastructure remains secure, compliant, and ready for deployment.
Candidates selected for this position must possess an active Top Secret with SCI eligibility. The interview process typically includes a technical deep-dive into your experience with cloud security, automation, and incident response, followed by a review of your certifications and background. Successful candidates will be invited to discuss their approach to security frameworks and operational resilience.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to fostering a diverse and inclusive environment where innovation thrives.
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process, including accessing job postings, completing assessments, or participating in interviews, please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
Hector International Airport, Joe Parmer Boulevard, Fargo, Cass County, North Dakota, 58105, United States
Fargo, North Dakota
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.