
location_onGallagator Linear Trail, Lindley Place, Bozeman, Gallatin County, Montana, 59715, United States
As part of Maximus TCS (Technology and Consulting Services), you will serve as a critical link in our DevSecOps ecosystem, ensuring the resilience and security of our cloud and on-premise infrastructure. This role exists to bridge the gap between development, security, and operations, transforming manual security processes into automated, scalable frameworks. You will be responsible for the end-to-end management of incident response, vulnerability scanning, and compliance efforts, ensuring that our systems remain robust against evolving threats.
In this position, you will not only diagnose root causes of network and security issues but also design and implement solutions that prevent recurrence. Your day-to-day involves collaborating with cross-functional teams to deploy automated security testing tools, managing access controls, and maintaining the integrity of proxy servers, firewalls, and systems. You will drive continuous improvement by researching technology trends in cloud site reliability engineering and recommending automation strategies to replace manual tasks, ultimately fostering a culture of security and efficiency.
To apply for this opportunity, please submit your resume through the official Maximus career portal. Candidates who require assistance during any phase of the employment process—including accessing job postings, completing assessments, or participating in interviews—due to a disability, medical condition, or physical or mental impairment should contact People Operations at applicantaccom@maximus.com to request reasonable accommodations.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to building a diverse workforce that reflects the communities we serve.
Maximus offers a comprehensive total compensation package. While annual salary is a key component, our rewards also include short- and long-term incentives, program-specific awards, health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays, and paid time off. Compensation is determined based on various factors including job location, education, training, experience, expected quality and quantity of work, required travel, and internal pay alignment. We do not use an applicant's salary history in determining compensation and will comply with all regulatory minimum wage rates and exempt salary thresholds.
Work model: On-site
Gallagator Linear Trail, Lindley Place, Bozeman, Gallatin County, Montana, 59715, United States
Bozeman, Montana
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.