Cloud Engineer: Mid to SME Level; currently hold US government Security Clearan
Listed on 2026-01-12
-
IT/Tech
Cybersecurity
cloud engineer: mid to sme level (applicants must currently hold us government security clearance - secret or above)
join to apply for the cloud engineer: mid to sme level (applicants must currently hold us government security clearance - secret or above) role at cipher tech solutions, inc.
descriptionthis is a cloud engineer position that will be expected to develop, deploy, and manage cloud infrastructure in amazon web services and microsoft azure. The position collaborates with application and operational teams to architect technical solutions and write secure infrastructure as code (iac) for provisioning and configuring the appropriate resources.
location: linthicum, maryland
requirements- must be a us citizen
- must hold a us government security clearance at the secret level or higher
- must have a degree in one of the following: computer science, electrical/computer engineering, information systems/technology, cybersecurity, software engineering, data science, math or physics.
- must have a minimum of 3 years professional post‑graduation experience related to this position.
- experience with terraform (preferred) or similar infrastructure as code (iac) technologies.
- experience designing and deploying cloud solutions in amazon web services or microsoft azure.
- excellent customer service and communication skills as well as the ability to prioritize and meet deadlines.
- strong leadership, interpersonal, and verbal/written communication skills that enable the ability to work effectively in a collaborative team environment.
- experience deploying and managing resources in government cloud environments such as aws govcloud, azure government, or similar.
- experience with version control systems such as gitlab, github, or similar.
- experience with ci/cd pipelines such as gitlab ci, github actions, or similar.
- experience with configuration as code (cac) technologies such as ansible, chef, puppet, or similar.
- experience with application development.
- experience with kubernetes.
- professional certifications in cloud technologies.
- security certification compliant with dod 8570/8140 iat ii (e.g., security+).
- mission focused work environment
- subsidized medical/dental/vision insurance
- hsa contributions
- 401(k) matching
- holiday and paid time off (pto)
- monthly wan parties & quarterly events
- flexible hours
remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.
salary and other compensationthe hourly rate of pay ranges from $43.27 – $79.33.
the salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire, including, but not limited to, the location of the position, clearance required for the position, and the contract associated with the position. See our perks & benefits page for a general description of benefits and other potential compensation benefits:
about usat cipher tech solutions, inc. (cipher tech), we take great pride in supporting some of the most mission critical work in the department of defense and the intelligence community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash‑drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counter‑intelligence, and counter‑terrorist activities.
malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
- how did it infect the victim's computer?
- what information it is seeking to steal?
- how is it communicating with the author (actor)?
- who that actor might be.
please be aware that you are applying for a position to work as a federal contractor. As such, cipher tech will require,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).