Senior DevSecOps Engineer

  • SAIC
  • FL
  • Apr 15, 2026

Job Description

Description
SAIC is seeking DevSecOps Engineer to join our team. The DevSecOps Engineer can work at one of the following SAIC locations: San Diego, CA, Charleston, SC, or Panama City, FL.
Role Overview:
  • Role: Platform Engineer building and running our internal developer platform (CI/CD, Kubernetes, pipelines and automation) for both connected and air-gapped environments.
  • Core Tooling: GitLab for source control and pipelines; Ansible as the primary automation language; Python for helpers/tests; Helm for Kubernetes deployments; MkDocs/ADRs for documentation.
  • Platform Stack: RKE2/Kubernetes on VMware/vSphere/NSX-T, with Rancher, Cilium networking, MetalLB/Traefik ingress, cert-manager, and BIND/DNS; Harbor as the container registry.
  • Delivery Expectations: trunk-based GitLab workflows, deterministic pipelines with built-in testing and security scans, evidence (JUnit/SBOM/scan) attached to every change, no manual "click-ops."
  • Supply Chain and Air-Gap Hygiene: checksum/signature/SBOM-driven movement of artifacts, RPM/PyPI mirroring via reposync and Pulp, offline scanning and promotion for high-side environments.
  • Security and Identity: secret hygiene by default, Keycloak/SSO integration familiarity, and comfort with vulnerability/misconfig scanning in CI (SAST, IaC, secret detection, Semgrep/KICS, Trivy/pip-audit).

Qualifications
Education Requirements:
  • Bachelors degree and five (5) years experience; Four (4) years' experience can be considered in lieu of degree.
Clearance Requirements:
  • Must possess an active Secret security clearance with the ability to obtain a Top Secret clearance; US Citizenship required.
Required Skills:
  • Strong background deploying and managing Kubernetes.
  • Experience with CI/CD pipelines.
  • Experience utilizing Helm for managing Kubernetes deployments.
  • Familiarity with Keycloak and SSO itegration.
Desired Skills:
  • Load balancer/VIP experience (Keepalived, VyOS or Palo Alto), RHEL/WSUS patching familiarity, and strong documentation habits for handoffs and audits .