
location_on79, Pennington Street, The Ironbound, Newark, Essex County, New Jersey, 07105, United States
Maximus Technology and Consulting Services (TCS) delivers critical solutions to government and commercial clients, focusing on secure, scalable, and resilient infrastructure. Within this team, we drive the integration of security, development, and operations to ensure mission-critical systems remain robust against evolving threats. Our mission is to empower organizations with automated, compliant, and high-performance environments that support national security and operational excellence.
This position serves as a pivotal link between security operations and DevSecOps practices. You will be responsible for orchestrating incident response, vulnerability management, and compliance efforts within a high-stakes environment. The role goes beyond traditional maintenance; it involves designing and implementing automated security frameworks that replace manual processes, thereby increasing efficiency and reducing risk.
In this capacity, you will collaborate with cross-functional teams to develop secure deployment tools and processes. Your day-to-day involves conducting risk assessments, managing proxy servers and firewalls, and performing penetration testing and security code reviews. You will also diagnose root causes of network or security issues using advanced monitoring tools and apply necessary patches to DevOps tooling. A key aspect of this role is fostering a culture of security awareness by training users on application security features and maintaining comprehensive operations runbooks to prevent recurring issues.
Candidates selected for this role will undergo a rigorous vetting process, including a review of technical qualifications and a security clearance verification. The interview process typically involves technical assessments focused on automation, security protocols, and system architecture, followed by team fit discussions. Successful candidates will be invited to discuss the specific scope of the project and final offer details.
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information, and other legally protected characteristics. We are committed to building a diverse workforce that reflects the communities we serve.
Maximus is dedicated to providing reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage—including accessing job postings, completing assessments, or participating in interviews—please contact People Operations at applicantaccom@maximus.com.
Work model: On-site
79, Pennington Street, The Ironbound, Newark, Essex County, New Jersey, 07105, United States
Newark, New Jersey
Certified Kubernetes Application Developer (CKAD), Red Hat Certified Engineer (RHCE), Certified Jenkins Engineer (CJE), AWS Certified DevOps Engineer, Certified Kubernetes Engineer (CKA), GitLab Certified DevOps Professional, or similar certifications. Familiarity with technical aspects for IT and IAT-Level II Certifications. Experience with CI/CD pipelines, infrastructure as code, and containerization technologies. Expertise in cloud platforms, automation tools, scripting languages, and security testing tools. Understanding of AWS, Azure, or GCP and their security services. Understanding of USAF IT systems, networks, and platforms. Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools for automating the build, test, and deployment process. Proficiency with tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning and configuration. Familiarity with Docker, Kubernetes, and related technologies. Proficiency in scripting languages like Python, Bash, or PowerShell to automate security tasks and workflows. Experience with static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) tools, as well as vulnerability scanners. Solid understanding of network security principles, including firewalls, intrusion detection/prevention systems, and network segmentation. Familiarity with SIEM solutions (like Splunk or ELK) and log aggregation tools for security monitoring. Familiarity with Identity and Access Management (IAM) and Zero Trust (ZT) security models.