DEVOPS Engineer :: Remote :: USC or GC ONLY ::Must have LinkedIn at Remote, Remote, USA |
Email: sgupta@kpgtech.com |
From: sonali gupta, KPG 99 sgupta@kpgtech.com Reply to: sgupta@kpgtech.com DEVOPS Engineer Fully Remote GC OR USC Only Duration 6+ Months This is super hands on so we agreed to call it a lead role until they convert. They need to be able to design, but deploy and do the hands-on work. Lead Engineer that can design Kubernetes/Container skills are the MOST important. Cloud would prefer multiple cloud experiences. Preference of skill set in this order Azure - most important for this role AWS - they have a lot of AWS but have AWS support as well so good experience here but would rather than have more working knowledge designing, deploying containers in Azure GCP Culture: Follow Agile, Some microservicves Have a product owner and scrum master Not super high output team yet No micromanaging Enterprise background Caveat is bc of all the politics and cross team pollination Work really hard to get requirements, contact with customers Not a simple chat message Technically agile Backlog grooming and demos Next gen cloud Middle to high on agile performance Certification preference CKA and CKS would be a huge plus Interview Process (2 rounds) 45 minutes with Director(video) 2nd interview with other Lead Manager (video) Job Description: Preferred Certifications: Certified Kubernetes Administrator (CKA) Certified Kubernetes Security Specialist (CKS) Certified Kubernetes Application Developer (CKAD) Requirements Understanding of Kubernetes, Docker, container images, and container security; Understanding of cloud-native concepts and the Cloud Native Computing Foundation (CNCF) Landscape; Understanding of at least one cloud provider and its underlying container services; Amazon Web Services Amazon Elastic Kubernetes Service (EKS) Amazon Elastic Container Service (ECS) AWS Fargate Microsoft Azure Azure Kubernetes Service (AKS) App Service Container Instances Google Cloud Google Kubernetes Engine (GKE) Cloud Run Working knowledge of at least one Kubernetes distribution; Amazon Elastic Kubernetes Service (EKS) Azure Kubernetes Service (AKS) Google Kubernetes Engine (GKE) Rancher / Rancher Kubernetes Engine (RKE) / K3s Red Hat OpenShift VMware Tanzu Kubernetes Grid (TKG) Mirantis Kubernetes Engine Nutanix Karbon Rafay Working knowledge of at least one service mesh technology; Istio Linkerd Kong Mesh / Kong Kuma HashiCorp Consul Connect AWS App Mesh OpenShift Service Mesh (Red Hat) Open Service Mesh (OSM) Demonstrating Familiarity with at least one Kubernetes security tool; Aqua Platform / Container Security / Kubernetes Security / Dynamic Threat Analysis Prisma Compute (previously Twistlock) Qualys Container Security Snyk Cloud Native Application Security (CNAS) StackRox Kubernetes Security Platform Sysdig Secure Demonstrating Familiarity with at least one container image scanning tool; Anchore Aqua Security / Trivy Clair Dagda Falco JFrog Xray Qualys Container Security Working knowledge of at least one container registry; Amazon Elastic Container Registry (ECR) Azure Container Registry (ACR) GitLab Container Registry Google Cloud Container Registry Harbor JFrog Container Registry Possessing Intimate understanding of the typical Kubernetes resources and how to create manifests defining them; ConfigMap DaemonSet Deployment Ingress PersistentVolume (PV) PersistentVolumeClaim (PVC) Pod ReplicaSet Secret Service StatefulSet Working knowledge of at least one Container Network Interface (CNI) driver; Amazon VPC CNI Azure CNI Calico Canal Cilium Flannel GKE CNI Weave Working knowledge of at least one Container Storage Interface (CSI) driver; AWS Elastic Block Storage (EBS) AWS Elastic File System (EFS) AWS FSx for Lustre (FSX) Azure Disk Azure File CephFS Ceph RBD GCE Persistent Disk Google Cloud Filestore Google Cloud Storage GlusterFS Longhorn Minio NetApp Nutanix OpenEBS Portworx Pure Storage CSI Scaleway CSI vSphere Demonstrating Intimate understanding of cloud networking concepts, including best-practices networking models and security; Understanding of microservice architecture and best practices; Working knowledge of creating a Dockerfile to build an OCI-compliant Docker / container image; Demonstrating the Ability to automate processes using Continuous Integration /Continuous Delivery (CI/CD) tools; Airflow Argo CD AWS CodePipeline Azure DevOps CircleCI Codefresh Concourse Flux CD / Flagger GitHub Actions GitLab Harness Jenkins / Jenkins X Spinnaker Tekton Travis CI Understanding of observability in Kubernetes using three or more tools from the following list Prometheus Grafana Alertmanager Elasticsearch Fluentd / Fluent Bit Kibana AppDynamics Datadog Dynatrace New Relic One Sumo Logic Working knowledge of all the following command line interface (CLI) tools; git helm kubectl Preferred: Working knowledge of the following; Python Golang / Go Bash HashiCorp Terraform / HashiCorp Configuration Language (HCL) Kubernetes Operators HashiCorp Vault Zero Trust Architecture (ZTA) Blue/green deployments, canary deployments Automated testing (ex: unit testing, integration testing, smoke testing) Experiencing working in a highly-regulated, highly-secure industry; SOC2 Information Security Policy (ISP) Controls Additional Responsibilities: Overseeing Architect, design, document, and implement leading edge enterprise solutions using cloud-native technologies and security best practices to deliver business value for internal customers at PwC; Collaborating with internal customers at PwC to gather business and technical requirements; Collaborating with various NextGen Cloud workstreams to create comprehensive enterprise solutions; Providing wisdom and direction to team members to accelerate the teams throughput and improve the quality of deliverables; Leading architecture and design workshops; and, Creating security standards and work with relevant teams to enforce those standards |
sgupta@kpgtech.com View All |
03:24 AM 15-Nov-22 |