Position Description
Overview:
We are looking for a skilled DevOps Engineer to support critical systems in a secure, mission-driven environment. You will work across development and operations to streamline deployments, enhance performance, and enforce security best practices. This role focuses on infrastructure automation, CI/CD pipeline optimization, and Kubernetes-based container orchestration using modern DevSecOps tools and methodologies.
Key Responsibilities:
Automate deployments and configuration management across environments
Develop and manage CI/CD pipelines using GitLab, ArgoCD, and GitOps tools
Create and maintain Helm charts and OpenShift Operators
Build secure, FIPS-compliant container images using UBI9-minimal base images
Integrate systems with enterprise authentication (e.g., LDAP, SSO)
Monitor systems using Grafana, Kibana, and Nagios; define key metrics
Manage hybrid infrastructure with Terraform, Ansible, and OpenShift
Maintain operational and architectural documentation
Participate in Agile/Scrum processes and Operational Readiness Boards
Support on-call operations, incident response, and root cause analysis
Required Qualifications:
Bachelor’s degree in Computer Science or related field (or equivalent experience)
8+ years of IT experience, including 3+ years with Kubernetes (OpenShift preferred)
Experience building GitLab CI/CD pipelines and using GitOps practices
Proficient in scripting (Python, Bash) and container tools (Docker, Helm)
Active TS/SCI clearance with CI polygraph eligibility
Familiarity with system security, IAM, and compliance standards
Desired Qualifications:
Experience developing Kubernetes Operators and using the Operator SDK
Proficiency with Go programming
Certifications such as Security+, AWS DevOps, CKA
Benefits
Protect your organization with indepth cyber security services
Cloud Security
Cloud security involves access controls, encryption, and monitoring to detect threats.
Firewall Protection
Access controls limit unauthorized system and data access.
Vulnerability Assessments
Vulnerability assessments reveal network weaknesses before attackers exploit them.
Data Encryption
Data encryption secures sensitive data from unauthorized access.