- All
- Status Update
- Hiring Needs
- Events
- Groups Joined
- Groups Messages
DevSecOps Engineer in Huntsville, AL Secret or Top Secret (SCI) Responsibilities: • Infrastructure-as-Code (IaC) Development. Design, write, and maintain IaC templates for Windows and Linux platforms using Ansible, Packer, Python and other scripting languages. Ensure all code is version-controlled, reviewed, and compliant with security standards. • Integrate automated testing, vulnerability scanning, and compliance verification into the stack. • STIG Baseline Hardening Automation • Develop reusable Ansible playbooks and custom scripts that automatically apply the DoD STIG baseline to systems. • Track and remediate any compliance drift on an ongoing basis. • Configuration-Management Baseline Establish a single source of truth for all configuration data (inventory, variables, secrets) that feeds the Ansible automation. • Implement secure secret management (Vault, Azure Key Vault, AWS Secrets Manager, etc.) and enforce idempotent deployments. • Evaluate, prototype, and stand-up new tools, containers, and services that keep C2BMC ahead of emerging technology trends. • Provide documentation, training, and knowledge transfer for any new capabilities introduced to the team. • Fully automate Software StackBuild and operate an end-to-end automation pipeline that provisions, hardens, and configures systems for the program. Preferred Qualifications: • Ansible Proficiency in playbook development, role creation, inventory management, and Ansible Automation Platform. • Experience building, packaging, and deploying containerized applications (Docker, Podman) and orchestrating them with Kubernetes or OpenShift. • Scripting Languages – Scripting in Python, Bash, and/or PowerShell for automation, data manipulation, and API integration. • Hands-on with GitLab CI/CD (or Jenkins, Azure DevOps, GitHub Actions) to design pipelines that include unit tests, security scans, and automated deployments. • Mastery of Git & workflows, pull-request reviews
DevSecOps Engineer in Huntsville, AL Secret or Top Secret (SCI) Responsibilities: • Infrastructure-as-Code (IaC) Development. Design, write, and maintain IaC templates for Windows and Linux platforms using Ansible, Packer, Python and other scripting languages. Ensure all code is version-controlled, reviewed, and compliant with security standards. • Integrate automated testing, vulnerability scanning, and compliance verification into the stack. • STIG Baseline Hardening Automation • Develop reusable Ansible playbooks and custom scripts that automatically apply the DoD STIG baseline to systems. • Track and remediate any compliance drift on an ongoing basis. • Configuration-Management Baseline Establish a single source of truth for all configuration data (inventory, variables, secrets) that feeds the Ansible automation. • Implement secure secret management (Vault, Azure Key Vault, AWS Secrets Manager, etc.) and enforce idempotent deployments. • Evaluate, prototype, and stand-up new tools, containers, and services that keep C2BMC ahead of emerging technology trends. • Provide documentation, training, and knowledge transfer for any new capabilities introduced to the team. • Fully automate Software StackBuild and operate an end-to-end automation pipeline that provisions, hardens, and configures systems for the program. Preferred Qualifications: • Ansible Proficiency in playbook development, role creation, inventory management, and Ansible Automation Platform. • Experience building, packaging, and deploying containerized applications (Docker, Podman) and orchestrating them with Kubernetes or OpenShift. • Scripting Languages – Scripting in Python, Bash, and/or PowerShell for automation, data manipulation, and API integration. • Hands-on with GitLab CI/CD (or Jenkins, Azure DevOps, GitHub Actions) to design pipelines that include unit tests, security scans, and automated deployments. • Mastery of Git & workflows, pull-request reviews
DevSecOps Engineer in Huntsville, AL Secret or Top Secret (SCI) Responsibilities: • Infrastructure-as-Code (IaC) Development. Design, write, and maintain IaC templates for Windows and Linux platforms using Ansible, Packer, Python and other scripting languages. Ensure all code is version-controlled, reviewed, and compliant with security standards. • Integrate automated testing, vulnerability scanning, and compliance verification into the stack. • STIG Baseline Hardening Automation • Develop reusable Ansible playbooks and custom scripts that automatically apply the DoD STIG baseline to systems. • Track and remediate any compliance drift on an ongoing basis. • Configuration-Management Baseline Establish a single source of truth for all configuration data (inventory, variables, secrets) that feeds the Ansible automation. • Implement secure secret management (Vault, Azure Key Vault, AWS Secrets Manager, etc.) and enforce idempotent deployments. • Evaluate, prototype, and stand-up new tools, containers, and services that keep C2BMC ahead of emerging technology trends. • Provide documentation, training, and knowledge transfer for any new capabilities introduced to the team. • Fully automate Software StackBuild and operate an end-to-end automation pipeline that provisions, hardens, and configures systems for the program. Preferred Qualifications: • Ansible Proficiency in playbook development, role creation, inventory management, and Ansible Automation Platform. • Experience building, packaging, and deploying containerized applications (Docker, Podman) and orchestrating them with Kubernetes or OpenShift. • Scripting Languages – Scripting in Python, Bash, and/or PowerShell for automation, data manipulation, and API integration. • Hands-on with GitLab CI/CD (or Jenkins, Azure DevOps, GitHub Actions) to design pipelines that include unit tests, security scans, and automated deployments. • Mastery of Git & workflows, pull-request reviews
DevSecOps Engineer in Huntsville, AL Secret or Top Secret (SCI) Responsibilities: • Infrastructure-as-Code (IaC) Development. Design, write, and maintain IaC templates for Windows and Linux platforms using Ansible, Packer, Python and other scripting languages. Ensure all code is version-controlled, reviewed, and compliant with security standards. • Integrate automated testing, vulnerability scanning, and compliance verification into the stack. • STIG Baseline Hardening Automation • Develop reusable Ansible playbooks and custom scripts that automatically apply the DoD STIG baseline to systems. • Track and remediate any compliance drift on an ongoing basis. • Configuration-Management Baseline Establish a single source of truth for all configuration data (inventory, variables, secrets) that feeds the Ansible automation. • Implement secure secret management (Vault, Azure Key Vault, AWS Secrets Manager, etc.) and enforce idempotent deployments. • Evaluate, prototype, and stand-up new tools, containers, and services that keep C2BMC ahead of emerging technology trends. • Provide documentation, training, and knowledge transfer for any new capabilities introduced to the team. • Fully automate Software StackBuild and operate an end-to-end automation pipeline that provisions, hardens, and configures systems for the program. Preferred Qualifications: • Ansible Proficiency in playbook development, role creation, inventory management, and Ansible Automation Platform. • Experience building, packaging, and deploying containerized applications (Docker, Podman) and orchestrating them with Kubernetes or OpenShift. • Scripting Languages – Scripting in Python, Bash, and/or PowerShell for automation, data manipulation, and API integration. • Hands-on with GitLab CI/CD (or Jenkins, Azure DevOps, GitHub Actions) to design pipelines that include unit tests, security scans, and automated deployments. • Mastery of Git & workflows, pull-request reviews
DevSecOps Engineer in Huntsville, AL Secret or Top Secret (SCI) Responsibilities: • Infrastructure-as-Code (IaC) Development. Design, write, and maintain IaC templates for Windows and Linux platforms using Ansible, Packer, Python and other scripting languages. Ensure all code is version-controlled, reviewed, and compliant with security standards. • Integrate automated testing, vulnerability scanning, and compliance verification into the stack. • STIG Baseline Hardening Automation • Develop reusable Ansible playbooks and custom scripts that automatically apply the DoD STIG baseline to systems. • Track and remediate any compliance drift on an ongoing basis. • Configuration-Management Baseline Establish a single source of truth for all configuration data (inventory, variables, secrets) that feeds the Ansible automation. • Implement secure secret management (Vault, Azure Key Vault, AWS Secrets Manager, etc.) and enforce idempotent deployments. • Evaluate, prototype, and stand-up new tools, containers, and services that keep C2BMC ahead of emerging technology trends. • Provide documentation, training, and knowledge transfer for any new capabilities introduced to the team. • Fully automate Software StackBuild and operate an end-to-end automation pipeline that provisions, hardens, and configures systems for the program. Preferred Qualifications: • Ansible Proficiency in playbook development, role creation, inventory management, and Ansible Automation Platform. • Experience building, packaging, and deploying containerized applications (Docker, Podman) and orchestrating them with Kubernetes or OpenShift. • Scripting Languages – Scripting in Python, Bash, and/or PowerShell for automation, data manipulation, and API integration. • Hands-on with GitLab CI/CD (or Jenkins, Azure DevOps, GitHub Actions) to design pipelines that include unit tests, security scans, and automated deployments. • Mastery of Git & workflows, pull-request reviews