Position: Network Infrastructure Designer (Sr. Engineer)
Location: Indianapolis IN (Hybrid)
Duration: Contract to hire (6 Months)
Only local USC/GC candidates will be considered.
Overview:
Were seeking a hands-on Network Engineer who can operate across traditional campus networking and AWS/Azure cloud networking. This role combines operational excellence with infrastructure-as-code (IaC) practices-CloudFormation first Git for version control and automation through Bash/PowerShell and Ansible. Youll help maintain a secure reliable network while contributing to automation and observability improvements.
Responsibilities:
- Operate and support routing switching segmentation enterprise wireless and SD-WAN edge devices.
- Implement and document firewall rule updates (Palo Alto) and VPN changes; collaborate with security on DNS security and policy enforcement.
- Build and support AWS networking (VPC Transit Gateway VPN security groups) and assist with Azure networking (VPN Gateway ExpressRoute).
- Develop and maintain AWS CloudFormation templates for network provisioning; manage templates in Git with proper branching and PR workflows.
- Write scripts in Bash or PowerShell for automation; leverage Ansible for configuration management.
- Monitor network health using AWS CloudWatch Azure Monitor and telemetry tools; contribute to observability improvements.
- Participate in ITIL-based change management incident response and CAB reviews; maintain accurate documentation for audits.
Requirements:
- 3 5 years in network/cloud engineering roles.
- Hands-on AWS networking and exposure to Azure networking.
- Proficiency in CloudFormation and Git workflows.
- Scripting in Bash or PowerShell; familiarity with Ansible.
- Strong troubleshooting and documentation skills.
Preferred:
- Palo Alto experience Terraform familiarity.
- AWS/Azure certifications (Cloud Practitioner Solutions Architect Associate Azure Fundamentals Network Engineer Associate).
- CCNA or equivalent.
- Experience with monitoring tools such as AWS CloudWatch Azure Monitor.
- Familiarity with ITIL-based change management processes and CAB participation.
Success Metrics (90/180 days):
- 90 days: Onboarded to Git/IaC workflows; delivering small CloudFormation changes and SG updates independently; improved a recurring task through a Bash/PowerShell script.
- 180 days: Owner for 1 2 reusable CloudFormation modules; contributed Ansible updates; reduced mean-time-to-resolve for a network issue class with an automation or runbook improvement.