Key Responsibilities
1. Deployment & Integration
Lead the deployment of SHIP and HATS solutions in government cloud environments such as AWS, Microsoft Azure Government, or Google Cloud for Public Sector.
Develop and implement Infrastructure-as-Code (IaC) templates for secure and automated deployments using tools like Terraform, CloudFormation, or Ansible.
Integrate SHIP with existing Continuous Integration/Continuous Deployment (CI/CD) pipelines to enhance development and testing workflows.
2. Secure Testing Solutions
Deploy and manage Hive Agile Testing Solutions (HATS) to support end-to-end automated testing for secure applications.
Configure testing environments for load testing, performance testing, and vulnerability assessments.
Ensure seamless integration between SHIP and HATS for secure, agile development processes.
3. Security & Compliance
Implement and enforce security controls in alignment with government standards such as FedRAMP, FISMA, and NIST 800-53.
Manage Identity and Access Management (IAM) policies and role-based access controls (RBAC) for secure resource access.
Conduct regular security audits, vulnerability scans, and compliance checks on SHIP and HATS deployments.
4. Performance Optimization
Monitor and optimize the performance of the SHIP pipeline and HATS testing environments to ensure high availability and scalability.
Identify and resolve bottlenecks in the pipeline to maintain efficient workflows.
Ensure robust logging, monitoring, and alerting solutions are in place for proactive issue management.
5. Collaboration & Reporting
Collaborate with cross-functional teams, including development, testing, security, and infrastructure teams, to ensure smooth deployment and integration.
Create and maintain detailed documentation, including architecture diagrams, deployment guides, and system configurations.
Provide regular updates to government stakeholders on project progress, performance metrics, and compliance status.
Preferred Skills
Prior experience working in a government (GCC and GCC+) environment.
Familiarity with DevSecOps practices and security automation.
Proficiency in Infrastructure-as-Code (IaC) and automation tools like Terraform, CloudFormation, and Ansible.