
location_on814, South 29th Street, Billings, Yellowstone County, Montana, 59101, United States
As part of Maximus TCS (Technology and Consulting Services), this position serves as a critical pillar in our DevSecOps ecosystem. The role exists to bridge the gap between development, security, and operations, ensuring that our infrastructure remains resilient, compliant, and secure against evolving threats. You will be the guardian of our deployment pipelines and network integrity, transforming manual security processes into automated, scalable frameworks.
In this capacity, you will not only manage incident response and vulnerability scanning but also drive the cultural shift toward "security by design." Your day-to-day involves collaborating with cross-functional teams to embed security into the software development lifecycle, from code review to production deployment. You will diagnose complex root causes in network and security operations, maintaining the runbooks that prevent recurring issues and ensuring our systems meet rigorous compliance standards.
Our team operates at the intersection of cloud reliability and national security. We are dedicated to supporting USAF IT systems and platforms, ensuring that our technology serves its mission with zero compromise on safety or availability. This role is vital for maintaining the trust of our stakeholders by proactively managing risk through advanced monitoring, penetration testing, and automated remediation strategies.
Candidates selected for this role will undergo a rigorous vetting process commensurate with the sensitive nature of the work. This includes a thorough review of technical capabilities and a mandatory security clearance verification. The interview process is designed to assess both technical depth in DevSecOps and the ability to navigate complex security landscapes.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to fostering a diverse and inclusive environment where all employees can thrive.
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process—including accessing job postings, completing assessments, or participating in interviews—please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
814, South 29th Street, Billings, Yellowstone County, Montana, 59101, United States
Billings, Montana
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.