Position Description
Overview:
We are seeking a versatile and experienced Cloud Engineer to support the design, implementation, and maintenance of secure, scalable cloud infrastructure. This position focuses on AWS environments and includes responsibilities across development, test, and production systems. The ideal candidate is skilled in systems engineering, infrastructure as code, and container orchestration, and is passionate about delivering reliable and secure solutions in
collaboration with cross-functional teams.
Key Responsibilities:
Design, deploy, and maintain scalable AWS infrastructure
Automate infrastructure using tools such as Terraform, Ansible, and CloudFormation
Implement and manage CI/CD pipelines using GitLab CI, Jenkins, or GitOps practices
Administer Linux (RHEL, Ubuntu) and Windows systems
Support containerized environments using Docker, Kubernetes, and OpenShift
Monitor systems with AWS CloudWatch and observability tools
Ensure security compliance across systems and meet DoD 8570/8140 standards
Integrate with enterprise authentication systems like Active Directory
Troubleshoot and resolve system and application issues
Maintain detailed documentation for systems, procedures, and compliance
Required Qualifications:
Bachelor’s degree in Computer Science, Engineering, or related field (or equivalent experience)
5+ years of relevant IT or cloud engineering experience
Strong expertise with AWS services (EC2, RDS, IAM, Lambda, etc.)
Proficiency in scripting (Python, Bash, PowerShell)
Experience with Docker and Kubernetes in production environments
Active TS/SCI clearance with CI polygraph eligibility
DoD 8570 IAT Level II or III certification (e.g., Security+, CySA+)
Preferred Qualifications:
AWS certifications (Cloud Practitioner, Solutions Architect)
Experience with Red Hat OpenShift
Familiarity with PostgreSQL, Redis, Elastic Stack
Benefits
Protect your organization with indepth cyber security services
Cloud Security
Cloud security involves access controls, encryption, and monitoring to detect threats.
Firewall Protection
Access controls limit unauthorized system and data access.
Vulnerability Assessments
Vulnerability assessments reveal network weaknesses before attackers exploit them.
Data Encryption
Data encryption secures sensitive data from unauthorized access.