Cloud Engineer - Harness (Only W2)

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Cloud Engineer with 7-10 years of experience, including 3-5 years in cloud engineering or IAM. Key skills include AWS IAM, Terraform, Python, and CI/CD. Contract length is unspecified; pay rate is W2. Remote location.
🌎 - Country
United States
πŸ’± - Currency
$ USD
-
πŸ’° - Day rate
-
πŸ—“οΈ - Date discovered
September 24, 2025
πŸ•’ - Project duration
Unknown
-
🏝️ - Location type
Unknown
-
πŸ“„ - Contract type
W2 Contractor
-
πŸ”’ - Security clearance
Unknown
-
πŸ“ - Location detailed
Plano, TX
-
🧠 - Skills detailed
#Security #Terraform #Version Control #Lambda (AWS Lambda) #Monitoring #Python #Compliance #AWS (Amazon Web Services) #Automation #Deployment #DevOps #Cloud #Infrastructure as Code (IaC) #Scripting #AWS CloudTrail #IAM (Identity and Access Management) #GIT
Role description
Notes: β€’ Years of experience: 7-10 years with 3–5 years specifically in cloud engineering, DevOps, or identity and access management (IAM) roles β€’ Experience with more Python coding experience. should also have experience with Lambda as it relates to Python. We use a lot of Lambda that is triggered by different events. β€’ We implement our solutions using Terraform and soon to be Harness. It will be plus, if the candidate has Harness experience in addition to Terraform. What you’ll be doing β€’ IAM Implementation: Assist in configuring and managing IAM roles, policies, and permission boundaries across AWS environments. β€’ Access Controls: Support the enforcement of least-privilege access and RBAC/ABAC models across cloud accounts. β€’ Infrastructure as Code (IaC): Contribute to the development of reusable IAM modules using Terraform or AWS CDK. β€’ CI/CD Support: Help integrate identity validation into CI/CD pipelines to ensure secure deployments. β€’ Security & Compliance: Collaborate with security teams to align IAM practices with compliance standards and audit requirements. β€’ Monitoring & Troubleshooting: Monitor IAM activity and assist in investigating identity-related issues using tools like AWS CloudTrail and Config. β€’ Team Collaboration: Work with engineering, security, and compliance teams to support identity initiatives and improve IAM processes. Qualifications/ What you bring (Must Haves) – Highlight Top 3-5 skills β€’ 3–5 years of hands-on experience in cloud engineering, DevOps, or identity and access management (IAM) roles. β€’ Strong expertise in AWS Identity Center, IAM, Organizations, and Single Sign-On (SSO). β€’ Proficient in Infrastructure as Code (IaC) using tools such as Terraform, AWS Cloud Development Kit (CDK), or similar. β€’ Solid understanding of identity governance, access control principles, and least privilege enforcement. β€’ Skilled in Python for automation, scripting, and integration tasks. β€’ Familiarity with AWS monitoring and auditing tools like CloudTrail, AWS Config, and Security Hub. β€’ Experience with CI/CD pipelines, version control (e.g., Git), and deployment automation. β€’ Knowledge of cloud security best practices, including encryption, key management, and compliance frameworks. β€’ Comfortable working in multi-account AWS environments and managing cross-account access.