Seeking a Systems Engineer for Ansible Automation in Government/Defense operations. Architect and maintain enterprise-scale automation frameworks with a focus on compliance and security.
Responsibilities
Architect and own enterprise-wide Ansible automation frameworks
Design, develop, and maintain scalable playbooks and reusable role structures
Establish best practices for configuration management, inventory structuring, and secrets handling
Build modular, version-controlled automation aligned with infrastructure lifecycle management
Integrate Ansible with CI/CD pipelines and DevOps toolchains
Automate system provisioning, patching, hardening, and compliance validation
Develop standardized automation for Linux and/or Windows environments
Collaborate with Security, Infrastructure, and DevOps teams to ensure automation aligns with compliance frameworks (e.g., STIG, NIST, RMF)
Troubleshoot and optimize automation workflows for performance and scalability
Provide technical mentorship and governance around automation standards
Maintain documentation, testing frameworks, and change control for automation assets
Requirements
Bachelor’s degree in Computer Science, Engineering, Information Systems, or related field (or equivalent experience)
5+ years of systems engineering or infrastructure automation experience
Demonstrated experience architecting and owning Ansible automation frameworks
Deep expertise in:
Ansible playbook development
Role-based architecture and modular design
Inventory and variable structuring at scale
Ansible Tower / AWX (or similar orchestration platforms)
Strong understanding of:
Linux system administration
Infrastructure as Code principles
Configuration management best practices
Experience integrating Ansible into CI/CD pipelines
Strong scripting experience (Python, Bash, or similar)
Experience managing automation in large, multi-environment infrastructures (Dev/Test/Prod)
Experience in security-focused or DoD-adjacent environments
Familiarity with STIG hardening
NIST 800-53 / RMF controls
FedRAMP or IL-level environments
Experience in containerized or cloud environments (AWS, Azure, GovCloud)
Active or prior security clearance
Experience automating patch management and vulnerability remediation workflows
System Engineer Linux responsible for Linux infrastructure and automation solutions at Swisscom. Contributing to security and compliance for military digitalization platform in Switzerland.
Associate Systems Developer supporting application development and maintenance at Thermo Fisher Scientific. Involves coding, testing, and collaborating with senior developers for technical requirements in a hybrid work environment.
Senior Mission System Engineer developing mission critical software applications with agile teams. Collaborating with users, stakeholders, and engineers to create efficient software solutions.
Nuclear Systems Engineer at Frazer - Nash solving complex engineering problems in the nuclear sector. Collaborates across teams to deliver innovative solutions on challenging projects.
Systems Engineering Manager leading a multidisciplinary team for Leidos' Air Traffic Business Area. Focused on developing mission - critical automation solutions in a hybrid cloud architecture.
IT SecOps System Engineer responsible for proactive security and collaboration across teams. Safeguarding on - premises and cloud environments in a 24/7 global ITSecOps practice.
Systems Engineer III coordinating HVAC control systems installation and programming for Mesa Energy Systems. Leading commissioning efforts and developing sequences of operations over 10 years of experience required.
Internship in Model - Based Systems Engineering for aerospace at Capgemini Engineering. Engaging in innovative system design and collaborative stakeholder workshops.
Systems Analyst managing service inventory planning for semiconductor manufacturing. Focused on data management, business analysis, and continuous improvement in a dynamic environment.
Windows Domain System Engineer managing Windows Server environments and supporting system performance at HII. Collaborating with virtualization engineers and providing Tier 2/3 technical support while ensuring security compliance.