Collaborate with customers and internal teams to design and implement automatic technical solutions across multiple classification environments, working independently or as part of the team to address complex technical requirements.
Develop CI/CD pipelines from scratch in GitLab CI and Jenkins with integrated security scanning and STIG compliance validation, providing expert guidance to development teams on pipeline troubleshooting and implementing DevSecOps best practices.
Create and maintain Infrastructure as Code (IaC) templates primarily using CloudFormation to architect highly available, resilient, and secure DevSecOps tool infrastructure across AWS environments (GovCloud, C2S, TC2S) while ensuring STIG compliance and guiding junior engineers on IaC best practices.
Lead advanced troubleshooting efforts by analyzing system and application logs using Linux command-line tools, conducting root cause analysis for complex issues, and developing mitigation strategies for service degradation.
Provide expert security guidance to development teams on secure coding practices, STIG compliance, vulnerability remediation, and other best practices in support of their ATO efforts.
Mentor junior engineers through code reviews, technical guidance, and knowledge sharing while maintaining technical documentation, promoting best practices, and fostering continuous team improvement.
Requirements
Active TS/SCI with CI Polygraph
Security+, or equivalent to satisfy DoD 8140/8570.
4+ years as DevSecOps/DevOps Engineer, with strong security focus.
Experience with designing, deploying, and managing production-grade OpenShift clusters (Rancher/K8s/K3s acceptable) via automation with Ansible and Terraform (CloudFormation acceptable) in on-prem and cloud environments.
Expert experience with Gitlab CI/CD pipelines (or equivalent).
Strong Helm chart development and lifecycle management.