Posted today
Top Secret/SCI
Entry Level (less than 2 yrs experience)
$85,000 - $115,000
No Traveling
Engineering - Systems
Remote/Hybrid•McLean, VA (Off-Site/Hybrid)•Omaha, NE (Off-Site/Hybrid)•Huntsville, AL (Off-Site/Hybrid)•Pittsburgh, PA (Off-Site/Hybrid)
Full-Stack Developer / DevSecOps Engineer to join our team in delivering secure, scalable, cloud-native applications that support critical national toolsets and large-scale user bases. This role combines hands-on software engineering with DevSecOps principles to embed security, automation, and resilience throughout the development lifecycle.
The ideal candidate thrives in a collaborative, Agile/Scrum environment, bringing expertise in modern full-stack development, containerized microservices, GitOps-driven CI/CD, and secure-by-design practices. You will contribute to building and sustaining high-performance systems in DoD-classified environments, leveraging tools aligned with the DoD Enterprise DevSecOps Reference Design (including CNCF Kubernetes, hardened containers from Iron Bank, and zero-trust architectures).
Whether your strength lies in crafting clean, testable code across frontend and backend, optimizing deployment pipelines, or integrating security controls (shift-left security, vulnerability scanning, SBOMs), you will drive innovation while ensuring compliance with rigorous DoD standards (e.g., RMF, continuous ATO reciprocity, STIGs).
Candidates must excel at independent problem-solving, critical thinking, and clear communication—both oral and written—while collaborating across development, security, operations, and mission stakeholder teams.
Duties and Responsibilities:
• Design, develop, maintain, and enhance full-stack web applications and microservices to support national-scale toolsets with high availability and large user bases.
• Implement and manage secure CI/CD pipelines, infrastructure as code (IaC), and automated deployments in cloud-native Kubernetes environments.
• Deploy and harden new systems, networks, and containerized workloads with embedded security practices.
• Conduct data processing, post-processing, reduction, and analysis to support mission outcomes.
• Apply Scrum/Agile framework principles in daily work, including sprint planning, backlog refinement, ceremonies, and continuous improvement.
• Produce well-documented analysis reports, technical briefings, and artifacts for stakeholders.
• Troubleshoot defects, collaborate closely with users/end-users to resolve issues, and deploy timely, secure fixes.
• Contribute to all phases of the software development lifecycle in a highly collaborative, cross-functional Scrum team.
• Assist senior engineers with complex assignments while mentoring juniors on best practices.
• Ensure code is efficient, testable, maintainable, and adheres to secure coding standards (e.g., OWASP, DoD hardening guidelines).
Required Qualifications:
• BS degree in Engineering, Computer Science, Information Technology, or related field.
• Minimum 2 years of professional experience in software development, DevSecOps, or related engineering roles.
• Active DoD Top Secret security clearance with SCI access (TS/SCI).
• Must be a U.S. Citizen per government contractual requirements.
Desired Qualifications
• Strong backend development experience with languages such as Golang (preferred for cloud-native/DevSecOps tools), Node.js, C++, Python, or similar.
• Proficiency in frontend technologies: React, TypeScript, JavaScript for building responsive, user-facing web applications.
• Expertise in CI/CD tools (e.g., GitLab CI, Jenkins, Argo CD for GitOps, Argo Workflows for complex pipelines).
• Hands-on experience with containerization and orchestration: Docker, Kubernetes (CKA/CKAD certification a plus), including deployment, scaling, and management in DoD environments.
• Knowledge of cloud security and multi-cloud platforms (AWS GovCloud, Azure DoD IL, GCP), including zero-trust models and compliance.
• Container and runtime security practices (e.g., vulnerability scanning, policy enforcement with Kyverno/OPA, hardened images from Iron Bank).
• Scripting and automation: Python, Bash, IaC tools (Terraform, Ansible).
• Database experience: SQL (PostgreSQL, MySQL) and NoSQL (MongoDB); familiarity with observability backends (e.g., Prometheus, Loki).
• API design and implementation: RESTful APIs, GraphQL, gRPC where applicable.
• Version control and collaboration: Git (GitLab/Repo One preferred).
• Observability tools: Grafana (dashboards/visualization), Jaeger or Tempo (distributed tracing), Prometheus (metrics), EFK/PLG stacks (logging).
• Solid Linux experience (system administration, troubleshooting, container hosts).
• Deep understanding of microservices architecture, service meshes (e.g., Istio for zero-trust/mTLS), and modular, loosely coupled designs.
• Proven ability to produce clean, efficient, testable code that meets technical and secure coding requirements.
• Experience working in Agile/Scrum teams, contributing end-to-end from requirements to deployment in high-stakes, classified settings.
• Fundamental knowledge of operating systems, networking, and programming paradigms to support platform-level troubleshooting and innovation.
The ideal candidate thrives in a collaborative, Agile/Scrum environment, bringing expertise in modern full-stack development, containerized microservices, GitOps-driven CI/CD, and secure-by-design practices. You will contribute to building and sustaining high-performance systems in DoD-classified environments, leveraging tools aligned with the DoD Enterprise DevSecOps Reference Design (including CNCF Kubernetes, hardened containers from Iron Bank, and zero-trust architectures).
Whether your strength lies in crafting clean, testable code across frontend and backend, optimizing deployment pipelines, or integrating security controls (shift-left security, vulnerability scanning, SBOMs), you will drive innovation while ensuring compliance with rigorous DoD standards (e.g., RMF, continuous ATO reciprocity, STIGs).
Candidates must excel at independent problem-solving, critical thinking, and clear communication—both oral and written—while collaborating across development, security, operations, and mission stakeholder teams.
Duties and Responsibilities:
• Design, develop, maintain, and enhance full-stack web applications and microservices to support national-scale toolsets with high availability and large user bases.
• Implement and manage secure CI/CD pipelines, infrastructure as code (IaC), and automated deployments in cloud-native Kubernetes environments.
• Deploy and harden new systems, networks, and containerized workloads with embedded security practices.
• Conduct data processing, post-processing, reduction, and analysis to support mission outcomes.
• Apply Scrum/Agile framework principles in daily work, including sprint planning, backlog refinement, ceremonies, and continuous improvement.
• Produce well-documented analysis reports, technical briefings, and artifacts for stakeholders.
• Troubleshoot defects, collaborate closely with users/end-users to resolve issues, and deploy timely, secure fixes.
• Contribute to all phases of the software development lifecycle in a highly collaborative, cross-functional Scrum team.
• Assist senior engineers with complex assignments while mentoring juniors on best practices.
• Ensure code is efficient, testable, maintainable, and adheres to secure coding standards (e.g., OWASP, DoD hardening guidelines).
Required Qualifications:
• BS degree in Engineering, Computer Science, Information Technology, or related field.
• Minimum 2 years of professional experience in software development, DevSecOps, or related engineering roles.
• Active DoD Top Secret security clearance with SCI access (TS/SCI).
• Must be a U.S. Citizen per government contractual requirements.
Desired Qualifications
• Strong backend development experience with languages such as Golang (preferred for cloud-native/DevSecOps tools), Node.js, C++, Python, or similar.
• Proficiency in frontend technologies: React, TypeScript, JavaScript for building responsive, user-facing web applications.
• Expertise in CI/CD tools (e.g., GitLab CI, Jenkins, Argo CD for GitOps, Argo Workflows for complex pipelines).
• Hands-on experience with containerization and orchestration: Docker, Kubernetes (CKA/CKAD certification a plus), including deployment, scaling, and management in DoD environments.
• Knowledge of cloud security and multi-cloud platforms (AWS GovCloud, Azure DoD IL, GCP), including zero-trust models and compliance.
• Container and runtime security practices (e.g., vulnerability scanning, policy enforcement with Kyverno/OPA, hardened images from Iron Bank).
• Scripting and automation: Python, Bash, IaC tools (Terraform, Ansible).
• Database experience: SQL (PostgreSQL, MySQL) and NoSQL (MongoDB); familiarity with observability backends (e.g., Prometheus, Loki).
• API design and implementation: RESTful APIs, GraphQL, gRPC where applicable.
• Version control and collaboration: Git (GitLab/Repo One preferred).
• Observability tools: Grafana (dashboards/visualization), Jaeger or Tempo (distributed tracing), Prometheus (metrics), EFK/PLG stacks (logging).
• Solid Linux experience (system administration, troubleshooting, container hosts).
• Deep understanding of microservices architecture, service meshes (e.g., Istio for zero-trust/mTLS), and modular, loosely coupled designs.
• Proven ability to produce clean, efficient, testable code that meets technical and secure coding requirements.
• Experience working in Agile/Scrum teams, contributing end-to-end from requirements to deployment in high-stakes, classified settings.
• Fundamental knowledge of operating systems, networking, and programming paradigms to support platform-level troubleshooting and innovation.
group id: 91159809