Logo
Egen

Cloud Software Engineer - GCP

Egen, Naperville, Illinois, United States, 60564


Egen is a data engineering and cloud modernization firm helping industry-leading companies achieve digital breakthroughs and deliver for the future, today. We are catalysts for change who create digital breakthroughs at warp speed. Our team of cloud and data engineering experts are trusted by top clients in pursuit of the extraordinary. An Inc. 5000 Fastest Growing Company 7 times, and recently recognized on the Crain’s Chicago Business Fast 50 list, Egen has also been recognized as a great place to work 3 times.The Egen Cloud Software Engineer is knowledgeable of infrastructure disciplines, including network design, system administration, storage management, security policy implementation, virtualization, and process automation (Terraform). The candidate must be able to build secure cloud infrastructure, support application runtime environments, and collaborate with engineers at all levels. The candidate should also be proactive, able to troubleshoot technical issues, and maintain automation scripts/tools.Further, the candidate will be responsible for engineering and implementing infrastructure in a GCP environment as well as performing day-to-day support and monitoring of its cloud infrastructure. The candidate will work with development teams and other infrastructure engineers to solve critical issues. Successful candidates must have worked in GCP environments and have an excellent understanding of cloud concepts. The candidate must possess strong technical aptitude, analytical skills, and communication skills, and demonstrate great problem-solving ability.RESPONSIBILITIES:

Implement cloud-based IaC solutionsDevelop and implement automation to support continuous delivery and continuous integration solutionsUse GCP services to deploy highly available, scalable, and secure applicationsImplement workflows to automate the release and upgrade process for applications in Development, Test, and Production environments.Implement secure integrations using Google security and networking technologies (IAP, VPC, and PSC)Administration and engineering of IAM user Role-Based Access Controls and processesCreate and update support documentation and standards.Develop automated methodologies for deployment activities, configuration management, supporting systems, and business processes.Investigate and contribute to solving various issues in production environments.Required Experience:

4+ years of professional experience managing infrastructure on GCP, AWS, and/or Azure including networking and access securityExperienced in deploying containers and container orchestration using Docker, Kubernetes, and its componentsExperience with Kubernetes components like Ingress Controllers, Cert Managers, Custom Resource Definitions, and RBAC access securityImplement secure integrations using Google security and networking technologies (IAP, VPC, and PSC)Administration and engineering of IAM user Role-Based Access Controls and processesExperienced in Infrastructure as Code (IaC) frameworks like Terraform, AWS CloudFormation, Azure RMExperienced in monitoring, alerting, and observability stack using Elastic Stack, Splunk, Prometheus, Grafana, CloudWatchExperienced in CI/CD Pipeline automation and integration using Jenkins, AWS CodePipeline, Build, Deploy, Azure DevOps, or other relevant toolingExperienced with building and maintaining distributed and stateful applications like Apache Kafka, Elasticsearch, Redis on the Kubernetes or VM clustersStrong experience with shell scripts, editors, SSH, awk/sed, git, and other Linux toolkitsIs self-directed, can work independently and make decisions autonomously at a high levelStrong background in software development (preferably with Python)Nice to have's (but not required):

Experience with cloud SDKs like AWS SDK, Kubernetes clients library, HelmExperience with MySQL, PostgreSQL, Bitbucket, GitHubKnowledge of service mesh frameworks like Istio, Linkerd, and Hashicorp Consul ConnectKnowledge of IAM and JWT authorization, SSO/OAuth (Azure AD, Okta)Knowledgeable of 12-factor app methodology and how they should be applied

#J-18808-Ljbffr