DevSecOps Engineer

Job Locations US-HI-Pearl Harbor
Job Post Information* : Posted Date 1 week ago(5/23/2023 7:14 PM)
Location : Location
US-HI-Pearl Harbor
Potential for Remote
Clearance Requirement
Job Requires Relocation
Job Requires Relocation


SOS International LLC (SOSi) is seeking a DevSecOps Engineer to join our team in Joint Base Pearl Harbor Hickam, Honolulu, Hawaii. The Mission Partner Environment – Engineering Services (MPE-ES) team based out of Honolulu, Hawaii creates, manages and supports IT solutions for USINDOPACOM, its mission and its 5,000+ customers throughout the Pacific theater. Our team solves challenging technical problems that enable USINDOPACOM to realize critical and time sensitive C2 strategies


Serves as an MPE-ES Subject Matter Expert (SME) regarding DevSecOps (Development, Security and Operations) for the MPE-ES Area-of-Responsibility (AOR). The qualified candidate will have relevant experience in both technology implementation/deployment, as well as proficiency with advisory and presentations for senior leadership. The MPE-ES DevSecOps Engineer will align customers to adopt an “everything as code model” to support Development, Test, Production Environments.  This includes identification of opportunities for DevSecOps automation utilizing infrastructure as code, security-as-code, compliance-as-code solutions, configuration as code, etc.


  • Serves as a primary point-of-contact (POC) regarding MPE-ES DevSecOps. Provides DevSecOps advisory services and proposal review as they pertain to MPE-ES related research, solution design and implementation while adhering to DoD IT framework, standards and policies.
  • Establish MPE-ES DevSecOps Foundation: processes, practices and procedures. Conduct assessment, analysis and develop relevant Courses of Action (COAs) according best practices.
  • Translate CI/CD requirements from concept to delivery. Able to dissect technical architecture into engineering plans and discrete tasks associated with enterprise-scale cloud development to fulfill Customer requirements.
  • Translates resulting tasks into well-defined repeatable processes (e.g., pipelines with the appropriate toolchain).
  • Employ DevSecOps utilities (e.g., scripts, applications, platforms, cloud-native services, API’s, etc.) for automation in order to meet efficiency, re-utilization and scalability requirements including testing.
  • Apply DevSecOps solutions where applicable to the larger MPE-ES services portfolio.
  • Assists Customers with DevOps practices (e.g., shared services, toolings, pipelines) and tools (e.g., Kubernetes/EKS, ECS, Docker) where applicable.
  • Troubleshoots, researches, and resolves issues with MPE-ES applications, systems and related components, especially those that impact mission functionality and/or availability.
  • Secures (protects) solution components according to Department of Defense (DoD) guidelines.
  • Documents & updates MPE-ES DevSecOps solutions in addition to, as it pertains to, DoD accreditation requirements. (e.g., create clear and concise program-level design artifacts, automation processes, DevSecOps pipelines, operational guides [runbooks], admin/user documentation etc.)
  • Coordinates and communicates with internal and external teams, including MPE-ES users and partners. Collaborates with internal Development team. Participates in solution lifecycle (e.g., testing)
  • Provides status updates and briefings to MPE-ES management and Government customer(s), as required. Completes activity reports in accordance with contract requirements.
  • Participates in related solution technologies and special projects, as required.




  • An Active in-scope SECRET clearance.
  • DoD 8570 IAT-II compliant (Security+ CE, CCNA-Security, CND, CySA+, GICSP, GSEC, or SSCP)
  • 5+ years of experience in DevSecOps. Comprehensive knowledge of the principles, methods, and techniques used in DevSecOps including:
  • Kubernetes (EKS), ECS and Docker containers fundamentals; container deployment and organization (e.g., packaging and image management, CI/CD, schedulers and orchestration, IaC, monitoring and management.
  • CI/CD tools (e.g., Terraform, Ansible, Git, Jenkins, AWS CodeCommit, AWS CodePipeline, etc.)
  • Security best practices, tools, and compliance frameworks (e.g., NIST, FedRamp, HIPAA, etc.)
  • Extended knowledge of modern operating systems (e.g., Windows, Linux) and related security configuration.
  • Experienced in implementing and supporting VDI/Virtual Environments and solutions (e.g., Citrix, VMware, Azure Cloud/Hyper-V, Nutanix AHV).
  • Fluency with automation/data-collection tools and languages (e.g., Ansible, PowerShell, JavaScript, BASH, Python etc.)
  • Able to support 24/7 operations (including support to exercises), when necessary.
  • Able to communicate effectively, verbally and in writing.
  • Excellent customer service skills especially in stressful, high-OPTEMO environments.
  • Able to follow instructions and work both independently and in a (distributed) team environment.

Preferred Qualifications

  • BS/BA in Computer Science, Computer Engineering or related field or equivalent technical experience
  • Relevant IT Certification (e.g., Cisco, Citrix, Dell, HP, ITIL, Microsoft, Nutanix, Palo Alto, VMware)

Working Conditions

  • Working conditions are normal for an office environment.
  • Fast paced, deadline-oriented environment.
  • May require periods of non-traditional working hours including consecutive nights or weekends (if applicable)


SOSi is an equal employment opportunity employer and affirmative action employer. All interested individuals will receive consideration and will not be discriminated against on the basis of race, color, religion, sex, national origin, disability, age, sexual orientation, gender identity, genetic information, or protected veteran status. SOSi takes affirmative action in support of its policy to advance diversity and inclusion of individuals who are minorities, women, protected veterans, and individuals with disabilities.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed