Gathering your results ...
29 days
Not Specified
Not Specified
Not Specified
<p>Employee Type: Regular Minimum of 7 years of progressive experience in cloud engineering, DevOps/DevSecOps, or cloud security engineering roles. 3+ years of hands-on experience with AWS (strong preference for GovCloud/FedRAMP environments). Experience with DoD Business IT systems Demonstrated experience building and maintaining CI/CD pipelines with security automation in GitHub Actions, GitLab CI/CD, Jenkins, or AWS-native tools. Production experience with container technologies (Docker, Kubernetes/EKS, Helm). Proven experience implementing Infrastructure as Code using Terraform and/or CloudFormation. Direct experience working with DoD cybersecurity requirements including NIST 800-171, NIST 800-53, DFARS, and/or CMMC. Design and manage production-grade AWS GovCloud environments supporting IL4/IL5 workloads in compliance with DoD CC SRG, including multi-account strategies, identity federation, and network segmentation using Transit Gateway, VPCs, and AWS core services (EC2, S3, RDS, Lambda, ECS/EKS, etc.). Build and maintain Infrastructure as Code (IaC) using Terraform, CloudFormation, and Ansible to ensure repeatable, auditable, and version-controlled infrastructure deployments with automated compliance enforcement. Design and implement end-to-end CI/CD pipelines using GitHub Actions, GitLab CI/CD, or AWS CodePipeline with integrated security gates, supporting complex multi-stage orchestration, parallel execution, and environment promotion strategies. Integrate shift-left security practices into build pipelines including SAST, DAST, SCA, container image scanning, and compliance-as-code tools (AWS Config Rules, OPA, Checkov) to enforce policy guardrails throughout the development lifecycle. Deploy and manage Kubernetes clusters (Amazon EKS) in GovCloud environments, including Helm charts, service mesh configuration, pod security policies, and container runtime security monitoring to enforce zero-trust principles. Build and optimize secure Docker container images using multi-stage builds, distroless base images, non-root execution, and vulnerability-free dependencies while driving continuous optimization of infrastructure provisioning and deployment throughput. Ensure compliance with federal security frameworks including NIST SP 800-171, NIST SP 800-53, DFARS 252.204-7012, and CMMC 2.0 Level 2, supporting A&A activities and documentation (SSP, POA&M, SAR). Implement continuous monitoring and security solutions including SIEM integration, vulnerability scanning (Nessus, Tenable.sc), EDR tools, AWS GuardDuty, Security Hub, and STIG hardening across systems and applications. Manage software supply chain security including artifact repositories (Nexus, Artifactory, AWS ECR), SBOM generation, artifact signing, and source code repository workflows in GitHub Enterprise/GitLab. Create technical documentation and provide mentorship, including architecture diagrams, runbooks, disaster recovery plans, SOPs, and guidance on cloud security best practices, IaC development, and DevSecOps tooling. DoD 8140 (formerly 8570) IAT Level II or higher certification. Qualifying certifications include: CompTIA Security+ CE CCNA Security GICSP, GSEC, or SSCP</p>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!