REQUIREMENTS:
- Experience : 5 Years
- Strong hands-on experience with core AWS services: EC2 S3 IAM RDS Lambda VPC CloudWatch CloudTrail Kafka etc.
- Experience in designing implementing and managing scalable cloud infrastructure.
- Familiarity with security best practices (IAM roles/policies encryption etc.).
- Exposure to cost optimization monitoring and logging using native AWS tools.
- Experience with multi-account strategy and networking (Transit Gateway VPC peering etc.) is a plus.
- Proficiency in writing Terraform code to manage AWS resources (Infrastructure as Code - IaC).
- Experience in creating reusable modular Terraform configurations using workspaces modules and remote backends.
- Understanding of Terraform state management and collaboration using Terraform Cloud or remote backends (e.g. S3 with DynamoDB lock).
- Experience with CI/CD integration for IaC pipelines.
- Good understanding of GitOps principles and ArgoCDâs role in Kubernetes deployment workflows.
- Experience setting up and configuring ArgoCD in a production-grade Kubernetes environment.
- Familiarity with ApplicationSets Sync Policies and RBAC within ArgoCD.
- Debugging sync errors managing app health/status and promoting secure GitOps practices.
- Experience packaging and deploying Kubernetes applications using Helm charts and/or Kustomize overlays.
- Writing custom Helm charts for in-house or open-source applications.
- Knowledge of Helm templating values files secrets management (Sealed Secrets / SOPS).
- Understanding trade-offs between Helm and Kustomize for specific use cases.
- Hands-on knowledge of Linux shell scripting.
- Experience with Jenkins (Freestyle and Pipeline) and Groovy scripting.
- Jenkins Master-Slave Architecture.
- Manage Jenkins infrastructure scaling in high-availability setups including installation plugin management and performance optimization
- Experience driving end-to-end security posture improvements across cloud and container environments including vulnerability remediation hardening and compliance.
- Hands-on with Vulnerability Assessment & Penetration Testing (VAPT) lifecycleâcoordinating assessments analyzing reports and executing remediation plans.
- Implemented cloud security best practices (IAM least privilege encrypted data flows audit logging security groups WAF GuardDuty Security Hub).
- Integrated Kubernetes security controls: network policies PodSecurity standards admission controllers (OPA/Gatekeeper) and CIS Benchmark enforcement.
- Proficient in Docker image scanning using tools like Trivy Clair or Aqua to detect and fix CVEs in base images and application dependencies.
RESPONSIBILITIES:
- Understanding the clients business use cases and technical requirements and be able to convert them into technical design which elegantly meets the requirements.
- Mapping decisions with requirements and be able to translate the same to developers.
- Identifying different solutions and being able to narrow down the best option that meets the clients requirements.
- Defining guidelines and benchmarks for NFR considerations during project implementation
- Writing and reviewing design document explaining overall architecture framework and high-level design of the application for the developers
- Reviewing architecture and design on various aspects like extensibility scalability security design patterns user experience NFRs etc. and ensure that all relevant best practices are followed.
- Developing and designing the overall solution for defined functional and non-functional requirements; and defining technologies patterns and frameworks to materialize it
- Understanding and relating technology integration scenarios and applying these learnings in projects
- Resolving issues that are raised during code/review through exhaustive systematic analysis of the root cause and being able to justify the decision taken.
- Carrying out POCs to make sure that suggested design/technologies meet the requirements.
Qualifications :
Bachelors or masters degree in computer science Information Technology or a related field.
Remote Work :
No
Employment Type :
Full-time
REQUIREMENTS: Experience : 5 YearsStrong hands-on experience with core AWS services: EC2 S3 IAM RDS Lambda VPC CloudWatch CloudTrail Kafka etc.Experience in designing implementing and managing scalable cloud infrastructure.Familiarity with security best practices (IAM roles/policies encryption etc.)...
REQUIREMENTS:
- Experience : 5 Years
- Strong hands-on experience with core AWS services: EC2 S3 IAM RDS Lambda VPC CloudWatch CloudTrail Kafka etc.
- Experience in designing implementing and managing scalable cloud infrastructure.
- Familiarity with security best practices (IAM roles/policies encryption etc.).
- Exposure to cost optimization monitoring and logging using native AWS tools.
- Experience with multi-account strategy and networking (Transit Gateway VPC peering etc.) is a plus.
- Proficiency in writing Terraform code to manage AWS resources (Infrastructure as Code - IaC).
- Experience in creating reusable modular Terraform configurations using workspaces modules and remote backends.
- Understanding of Terraform state management and collaboration using Terraform Cloud or remote backends (e.g. S3 with DynamoDB lock).
- Experience with CI/CD integration for IaC pipelines.
- Good understanding of GitOps principles and ArgoCDâs role in Kubernetes deployment workflows.
- Experience setting up and configuring ArgoCD in a production-grade Kubernetes environment.
- Familiarity with ApplicationSets Sync Policies and RBAC within ArgoCD.
- Debugging sync errors managing app health/status and promoting secure GitOps practices.
- Experience packaging and deploying Kubernetes applications using Helm charts and/or Kustomize overlays.
- Writing custom Helm charts for in-house or open-source applications.
- Knowledge of Helm templating values files secrets management (Sealed Secrets / SOPS).
- Understanding trade-offs between Helm and Kustomize for specific use cases.
- Hands-on knowledge of Linux shell scripting.
- Experience with Jenkins (Freestyle and Pipeline) and Groovy scripting.
- Jenkins Master-Slave Architecture.
- Manage Jenkins infrastructure scaling in high-availability setups including installation plugin management and performance optimization
- Experience driving end-to-end security posture improvements across cloud and container environments including vulnerability remediation hardening and compliance.
- Hands-on with Vulnerability Assessment & Penetration Testing (VAPT) lifecycleâcoordinating assessments analyzing reports and executing remediation plans.
- Implemented cloud security best practices (IAM least privilege encrypted data flows audit logging security groups WAF GuardDuty Security Hub).
- Integrated Kubernetes security controls: network policies PodSecurity standards admission controllers (OPA/Gatekeeper) and CIS Benchmark enforcement.
- Proficient in Docker image scanning using tools like Trivy Clair or Aqua to detect and fix CVEs in base images and application dependencies.
RESPONSIBILITIES:
- Understanding the clients business use cases and technical requirements and be able to convert them into technical design which elegantly meets the requirements.
- Mapping decisions with requirements and be able to translate the same to developers.
- Identifying different solutions and being able to narrow down the best option that meets the clients requirements.
- Defining guidelines and benchmarks for NFR considerations during project implementation
- Writing and reviewing design document explaining overall architecture framework and high-level design of the application for the developers
- Reviewing architecture and design on various aspects like extensibility scalability security design patterns user experience NFRs etc. and ensure that all relevant best practices are followed.
- Developing and designing the overall solution for defined functional and non-functional requirements; and defining technologies patterns and frameworks to materialize it
- Understanding and relating technology integration scenarios and applying these learnings in projects
- Resolving issues that are raised during code/review through exhaustive systematic analysis of the root cause and being able to justify the decision taken.
- Carrying out POCs to make sure that suggested design/technologies meet the requirements.
Qualifications :
Bachelors or masters degree in computer science Information Technology or a related field.
Remote Work :
No
Employment Type :
Full-time
View more
View less