

Danta Technologies
Terraform Lead | Santa Clara, CA
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Senior Terraform Lead, offering a contract length of "unknown" at a pay rate of $70/hr, located in Santa Clara, CA, or remote. Key skills include Terraform expertise, Azure platform engineering, and AKS automation.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
560
-
ποΈ - Date
February 22, 2026
π - Duration
Unknown
-
ποΈ - Location
Remote
-
π - Contract
W2 Contractor
-
π - Security
Yes
-
π - Location detailed
Santa Clara, CA
-
π§ - Skills detailed
#Compliance #Containers #Automation #Migration #Strategy #Documentation #Storage #DevOps #Monitoring #Kubernetes #Argo #Scala #GitHub #Security #Vault #Deployment #Terraform #Scripting #Observability #Azure #Azure DevOps #Python #Infrastructure as Code (IaC) #Bash
Role description
Senior Terraform Lead
Location- Santa Clara, CA / Remote is also ok
Buy Rate- $70/hr
Engagement Summary
We are looking for a strong Terraform engineer to build and operationalize a Terraform-first Azure infrastructure platform. The work includes (but is not limited to) automated provisioning and lifecycle management of Azure services such as AKS, Storage Accounts, identity/access controls, networking, observability, security services, and data/analytics services including Microsoft Fabric. A key deliverable is to convert and rationalize existing IaC (significant Bicep footprint) into reusable, tested Terraform modules and pipelines.
Key Responsibilities
Infrastructure as Code (Terraform-first on Azure)
β’ Design and implement Terraform modules for consistent, reusable provisioning of Azure infrastructure across environments (dev/test/prod).
β’ Build patterns for subscription/resource-group organization, naming standards, tagging, and environment overlays.
β’ Implement end-to-end automation: plan/apply workflows, validation, drift detection, and safe promotion between environments.
Kubernetes / AKS automation
β’ Provision and manage AKS clusters via Terraform, including node pools, networking integration, add-ons, policies, and baseline security.
β’ Enable repeatable cluster bootstrapping (GitOps-ready patterns preferred).
Storage + Access Governance as Code
β’ Create and manage Storage Accounts and related services (containers, encryption, networking rules, private endpoints, diagnostics).
β’ Implement RBAC/access management as code: role assignments, managed identities, service principals, group-based access, least-privilege patterns.
β’ Expectation: permissions are defined and tracked in Terraform to reduce configuration drift.
Broad Azure services enablement (not limited to examples)
β’ Extend module library to cover diverse Azure services needed by platform/application/data teams (networking, security, compute, PaaS, monitoring, etc.).
β’ Collaborate with architects/engineering teams to turn platform requirements into scalable Terraform patterns.
Microsoft Fabric (and data platform) automation
β’ Automate provisioning and configuration of Microsoft Fabric workspaces and related constructs via Terraform where supported, including required identity/permission setup.
β’ We already have evidence of Fabric workspace deployment via Terraform pipelines and the need to configure permissions correctly for service principals.
Bicep β Terraform conversion
β’ Assess existing Bicep IaC and lead a conversion strategy:
β’ Map Bicep modules to Terraform modules/providers
β’ Establish equivalency patterns and migration sequencing
β’ Handle importing existing resources into state where needed
β’ Minimize disruption and downtime during migration
β’ Improve standardization by consolidating duplicated patterns and creating a shared module registry.
CI/CD & Operational Excellence
β’ Implement and maintain CI/CD pipelines for Terraform (linting, validation, unit tests, security scans, policy checks).
β’ Establish best practices for Terraform state management, locking, secrets handling, and safe refactors.
β’ Create developer enablement assets: examples, module docs, onboarding guidance.
Required Skills (Must-have)
Terraform Expertise
β’ 5+ years of hands-on Terraform (or equivalent depth), including:
β’ Module design (composable, versioned modules)
β’ Remote state design, state locking, workspaces/environments
β’ Imports, refactors (state mv), drift management, dependency control
β’ Strong experience with the AzureRM provider (and related providers where needed).
Azure Platform Engineering
β’ Deep understanding of Azure fundamentals: subscriptions, management groups, resource groups, networking, identity, governance.
β’ Strong experience with Azure RBAC, managed identities, service principals, and group-based access models (Entra ID/AAD concepts).
AKS
β’ Proven experience deploying and operating AKS via automation: cluster lifecycle, networking, policies, add-ons, security baseline.
Security & Governance
β’ Implements least privilege; codifies access controls; understands auditability/compliance expectations.
β’ Experience with secret management patterns (avoid committing secrets; integrate with vault systems; secure tfvars/state).
DevOps / Automation
β’ CI/CD experience (Azure DevOps, GitHub Actions, or similar) for Terraform workflows.
β’ Familiarity with trunk-based development, PR validation, and infrastructure testing patterns.
β’ Comfort with scripting (PowerShell/Python/Bash) to glue workflows and automate validations.
Preferred Skills (Nice-to-have)
β’ Microsoft Fabric provisioning and automation experience (workspace deployment, permissions, integrations).
β’ Experience converting IaC between frameworks (ARM/Bicep β Terraform).
β’ Experience with policy-as-code (Azure Policy), OPA/Conftest, or Sentinel.
β’ Experience designing multi-tenant landing zones / enterprise-scale Azure architectures.
β’ Knowledge of GitOps tooling (Flux/Argo) and Kubernetes add-on management.
Deliverables / Outcomes (What Success Looks Like)
Within the engagement, the engineer will:
β’ Deliver a Terraform module library covering core platform patterns and commonly used Azure services.
β’ Stand up a production-grade Terraform CI/CD workflow (validate/plan/apply, approvals, drift checks).
β’ Implement standard access management as code (RBAC patterns, role assignment modules, least-privilege guardrails).
β’ Provide AKS and Storage automation reference implementations (as exemplars, not the only scope).
β’ Define and execute a BicepβTerraform migration plan, including import/state strategy and phased rollout.
β’ Produce documentation: module usage guides, onboarding, and operational runbooks.
Screening / Vendor Evaluation Checklist (you can paste this into an RFP)
Ask Vendors To Provide
β’ 2-3 examples of Terraform module repos they authored (sanitized is fine) demonstrating structure, testing, and versioning.
β’ A sample CI/CD pipeline for Terraform with policy checks and environment promotion.
β’ A short write-up on how they handle:
β’ Remote state + locking
β’ Secrets management
β’ Importing existing Azure resources into Terraform state
β’ RBAC/permissions as code patterns (group-based access, least privilege)
Optional but strong: examples of AKS and/or Microsoft Fabric automation work.
Notes:- All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.
Benefits: Danta offers a compensation package to all W2 employees that are competitive in the industry. It consists of competitive pay, the option to elect healthcare insurance (Dental, Medical, Vision), Major holidays and Paid sick leave as per state law.
The rate/ Salary range is dependent on numerous factors including Qualification, Experience and Location.
Senior Terraform Lead
Location- Santa Clara, CA / Remote is also ok
Buy Rate- $70/hr
Engagement Summary
We are looking for a strong Terraform engineer to build and operationalize a Terraform-first Azure infrastructure platform. The work includes (but is not limited to) automated provisioning and lifecycle management of Azure services such as AKS, Storage Accounts, identity/access controls, networking, observability, security services, and data/analytics services including Microsoft Fabric. A key deliverable is to convert and rationalize existing IaC (significant Bicep footprint) into reusable, tested Terraform modules and pipelines.
Key Responsibilities
Infrastructure as Code (Terraform-first on Azure)
β’ Design and implement Terraform modules for consistent, reusable provisioning of Azure infrastructure across environments (dev/test/prod).
β’ Build patterns for subscription/resource-group organization, naming standards, tagging, and environment overlays.
β’ Implement end-to-end automation: plan/apply workflows, validation, drift detection, and safe promotion between environments.
Kubernetes / AKS automation
β’ Provision and manage AKS clusters via Terraform, including node pools, networking integration, add-ons, policies, and baseline security.
β’ Enable repeatable cluster bootstrapping (GitOps-ready patterns preferred).
Storage + Access Governance as Code
β’ Create and manage Storage Accounts and related services (containers, encryption, networking rules, private endpoints, diagnostics).
β’ Implement RBAC/access management as code: role assignments, managed identities, service principals, group-based access, least-privilege patterns.
β’ Expectation: permissions are defined and tracked in Terraform to reduce configuration drift.
Broad Azure services enablement (not limited to examples)
β’ Extend module library to cover diverse Azure services needed by platform/application/data teams (networking, security, compute, PaaS, monitoring, etc.).
β’ Collaborate with architects/engineering teams to turn platform requirements into scalable Terraform patterns.
Microsoft Fabric (and data platform) automation
β’ Automate provisioning and configuration of Microsoft Fabric workspaces and related constructs via Terraform where supported, including required identity/permission setup.
β’ We already have evidence of Fabric workspace deployment via Terraform pipelines and the need to configure permissions correctly for service principals.
Bicep β Terraform conversion
β’ Assess existing Bicep IaC and lead a conversion strategy:
β’ Map Bicep modules to Terraform modules/providers
β’ Establish equivalency patterns and migration sequencing
β’ Handle importing existing resources into state where needed
β’ Minimize disruption and downtime during migration
β’ Improve standardization by consolidating duplicated patterns and creating a shared module registry.
CI/CD & Operational Excellence
β’ Implement and maintain CI/CD pipelines for Terraform (linting, validation, unit tests, security scans, policy checks).
β’ Establish best practices for Terraform state management, locking, secrets handling, and safe refactors.
β’ Create developer enablement assets: examples, module docs, onboarding guidance.
Required Skills (Must-have)
Terraform Expertise
β’ 5+ years of hands-on Terraform (or equivalent depth), including:
β’ Module design (composable, versioned modules)
β’ Remote state design, state locking, workspaces/environments
β’ Imports, refactors (state mv), drift management, dependency control
β’ Strong experience with the AzureRM provider (and related providers where needed).
Azure Platform Engineering
β’ Deep understanding of Azure fundamentals: subscriptions, management groups, resource groups, networking, identity, governance.
β’ Strong experience with Azure RBAC, managed identities, service principals, and group-based access models (Entra ID/AAD concepts).
AKS
β’ Proven experience deploying and operating AKS via automation: cluster lifecycle, networking, policies, add-ons, security baseline.
Security & Governance
β’ Implements least privilege; codifies access controls; understands auditability/compliance expectations.
β’ Experience with secret management patterns (avoid committing secrets; integrate with vault systems; secure tfvars/state).
DevOps / Automation
β’ CI/CD experience (Azure DevOps, GitHub Actions, or similar) for Terraform workflows.
β’ Familiarity with trunk-based development, PR validation, and infrastructure testing patterns.
β’ Comfort with scripting (PowerShell/Python/Bash) to glue workflows and automate validations.
Preferred Skills (Nice-to-have)
β’ Microsoft Fabric provisioning and automation experience (workspace deployment, permissions, integrations).
β’ Experience converting IaC between frameworks (ARM/Bicep β Terraform).
β’ Experience with policy-as-code (Azure Policy), OPA/Conftest, or Sentinel.
β’ Experience designing multi-tenant landing zones / enterprise-scale Azure architectures.
β’ Knowledge of GitOps tooling (Flux/Argo) and Kubernetes add-on management.
Deliverables / Outcomes (What Success Looks Like)
Within the engagement, the engineer will:
β’ Deliver a Terraform module library covering core platform patterns and commonly used Azure services.
β’ Stand up a production-grade Terraform CI/CD workflow (validate/plan/apply, approvals, drift checks).
β’ Implement standard access management as code (RBAC patterns, role assignment modules, least-privilege guardrails).
β’ Provide AKS and Storage automation reference implementations (as exemplars, not the only scope).
β’ Define and execute a BicepβTerraform migration plan, including import/state strategy and phased rollout.
β’ Produce documentation: module usage guides, onboarding, and operational runbooks.
Screening / Vendor Evaluation Checklist (you can paste this into an RFP)
Ask Vendors To Provide
β’ 2-3 examples of Terraform module repos they authored (sanitized is fine) demonstrating structure, testing, and versioning.
β’ A sample CI/CD pipeline for Terraform with policy checks and environment promotion.
β’ A short write-up on how they handle:
β’ Remote state + locking
β’ Secrets management
β’ Importing existing Azure resources into Terraform state
β’ RBAC/permissions as code patterns (group-based access, least privilege)
Optional but strong: examples of AKS and/or Microsoft Fabric automation work.
Notes:- All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.
Benefits: Danta offers a compensation package to all W2 employees that are competitive in the industry. It consists of competitive pay, the option to elect healthcare insurance (Dental, Medical, Vision), Major holidays and Paid sick leave as per state law.
The rate/ Salary range is dependent on numerous factors including Qualification, Experience and Location.






