DevOps / Site Reliability Engineer

Joom
Full_timeLisbon, Portugal

📍 Job Overview

  • Job Title: DevOps / Site Reliability Engineer
  • Company: Joom
  • Location: Lisbon, Lisboa, Portugal
  • Job Type: Full-Time
  • Category: DevOps Engineer
  • Date Posted: 2025-01-23
  • Experience Level: Mid-Senior level (2-5 years of experience)

🚀 Role Summary

  • Lead the development and support of Joom's key infrastructure components.
  • Collaborate with cross-functional teams to ensure high availability and reliability of services.
  • Design, implement, and maintain infrastructure as code (IaC) using tools like Terraform and Terragrunt.
  • Troubleshoot and resolve complex infrastructure issues, improving system observability.
  • Stay updated with emerging technologies and best practices in DevOps and Site Reliability Engineering.

📝 Enhancement Note: This role requires a strong background in infrastructure automation, cloud services, and networking. Familiarity with Python, Go, Kubernetes, and AWS is essential for success in this position.

💻 Primary Responsibilities

  • Infrastructure Development & Management: Design, implement, and maintain infrastructure as code using tools like Terraform and Terragrunt. Ensure the scalability, reliability, and security of Joom's infrastructure.
  • Troubleshooting & Resolution: Diagnose and resolve complex infrastructure issues. Collaborate with development teams to identify and mitigate potential service disruptions.
  • Observability & Monitoring: Implement and maintain logging, monitoring, and alerting systems. Ensure that infrastructure issues are quickly identified and resolved.
  • Collaboration & Knowledge Sharing: Work closely with development, QA, and other teams to ensure infrastructure meets their needs. Share knowledge and best practices with the broader team.

📝 Enhancement Note: This role requires a proactive approach to infrastructure management. Candidates should be comfortable working in a dynamic environment and driving change to improve system reliability and performance.

🎓 Skills & Qualifications

Education: A Bachelor's degree in Computer Science, Engineering, or a related field. Relevant experience may be considered in lieu of a degree.

Experience: 2-5 years of experience in a DevOps or Site Reliability Engineering role. Experience with Python, Go, Kubernetes, and AWS is required.

Required Skills:

  • Strong knowledge of Python or Go for infrastructure task automation.
  • Experience with log storage and viewing services like ELK or Loki.
  • Good understanding of networking, including technologies like IPSEC and dynamic routing protocols.
  • Experience with Kubernetes (K8s).
  • Experience with any deployment or configuration management system: Ansible, Puppet, Chef, Terraform.
  • Experience with cloud services: AWS (or similar cloud), S3.

Preferred Skills:

  • Specific knowledge of how the following work: Kafka, Graphite, Grafana, Ansible, Filebeat, AWS Athena, Prometheus (Victoria Metrics).
  • Advanced developer skills.
  • Knowledge of PCI DSS.

📝 Enhancement Note: Candidates with experience in a fast-paced, e-commerce environment will be at an advantage. Familiarity with Joom's tech stack and the ability to hit the ground running are highly desirable.

📊 Web Portfolio & Project Requirements

Portfolio Essentials:

  • Demonstrate your experience with infrastructure automation, cloud services, and networking through relevant projects.
  • Showcase your ability to design, implement, and maintain scalable, reliable, and secure infrastructure.
  • Highlight your problem-solving skills and ability to troubleshoot complex infrastructure issues.

Technical Documentation:

  • Include documentation for your infrastructure projects, demonstrating your ability to write clear and concise technical documentation.
  • Showcase your understanding of version control, deployment processes, and server configuration.
  • Demonstrate your ability to test, optimize, and monitor infrastructure components.

📝 Enhancement Note: Your portfolio should demonstrate your ability to work with Joom's tech stack and your understanding of the specific requirements of this role. Include case studies that highlight your ability to improve system reliability, performance, and scalability.

💵 Compensation & Benefits

Salary Range: €45,000 - €60,000 per year (based on experience and skills). This is a competitive salary for a mid-senior level DevOps Engineer role in Lisbon.

Benefits:

  • Compensation package: base salary and performance-based bonuses.
  • Office-first: flexible hours with a possibility to work remotely 52 days per year, and 22 days of paid annual leave.
  • Care & Wellbeing: health insurance (including dental care) for employees and their children, daily meal allowance, and 100% paid sick leave.
  • Team & Growth: collaboration with colleagues across Portugal, Brazil, Latvia, and China, with opportunities for promotions, professional trainings, and English courses.
  • Community & Engagement: annual team building activities, knowledge-sharing workshops, and a strong sense of teamwork.

Working Hours: 40 hours per week, with flexible hours and the possibility to work remotely up to 52 days per year.

📝 Enhancement Note: The salary range provided is based on market research for mid-senior level DevOps Engineer roles in Lisbon. The benefits package is competitive and includes health insurance, meal allowance, and generous leave entitlement.

🎯 Team & Company Context

🏢 Company Culture

Industry: Joom operates in the e-commerce industry, with a focus on cross-border trade. This role will involve working with a diverse, international team to ensure the reliability and scalability of Joom's infrastructure.

Company Size: Joom Group is an international tech-centric group of e-commerce companies with offices in China, Brazil, Portugal, Latvia, and Germany. The company has around 250 employees, providing a dynamic and collaborative work environment.

Founded: Joom Group was founded in 2016 in Latvia. The company has since grown to become a leading player in the cross-border e-commerce market.

Team Structure:

  • The Basic Infrastructure team is responsible for the support and development of Joom's key infrastructure components.
  • The team works closely with development, QA, and other teams to ensure infrastructure meets their needs.
  • The team is part of the broader Engineering department, which includes teams focused on product development, data engineering, and quality assurance.

Development Methodology:

  • Joom uses Agile methodologies for product development, with a focus on collaboration, continuous improvement, and customer value.
  • The Basic Infrastructure team uses an Infrastructure as Code (IaC) approach, with a focus on automation, version control, and continuous integration/continuous deployment (CI/CD) pipelines.
  • The team uses tools like Terraform, Terragrunt, Python, Go, Ansible, AWX, Docker, Linux, Ubuntu, K8S, Packer, AWS, and other cloud platforms.

Company Website: Joom Group

📝 Enhancement Note: Joom's company culture is dynamic, collaborative, and focused on driving innovation in the e-commerce industry. The company values diversity, inclusion, and continuous learning. The Basic Infrastructure team plays a critical role in ensuring the reliability and scalability of Joom's infrastructure, enabling the company to deliver on its mission to transform global trade.

📈 Career & Growth Analysis

Web Technology Career Level: This role is at the mid-senior level for a DevOps Engineer or Site Reliability Engineer. The role requires a strong background in infrastructure automation, cloud services, and networking. Candidates should have 2-5 years of experience in a similar role and be comfortable working in a dynamic, fast-paced environment.

Reporting Structure: This role reports directly to the Head of Infrastructure. The role may have opportunities to mentor junior team members and contribute to the broader development of the team's skills and capabilities.

Technical Impact: The DevOps/SRE Engineer will have a significant impact on the reliability, scalability, and performance of Joom's infrastructure. The role will involve working on critical infrastructure components and driving improvements in system observability, troubleshooting, and automation.

Growth Opportunities:

  • Technical Growth: This role provides opportunities for technical growth and specialization in areas like infrastructure automation, cloud services, and networking. Candidates can expect to work with cutting-edge technologies and gain exposure to a wide range of infrastructure challenges.
  • Leadership Growth: As the team grows, there may be opportunities for candidates to take on more senior roles, with responsibilities for team leadership, architecture, and strategic decision-making.
  • Career Progression: Joom offers opportunities for career progression within the company. Candidates may have the opportunity to move into more senior roles or explore different areas of the business.

📝 Enhancement Note: This role provides a unique opportunity to work in a dynamic, international e-commerce environment. Candidates can expect to work on challenging infrastructure problems, drive system improvements, and gain exposure to a wide range of technologies and teams. The role offers significant potential for technical and career growth.

🌐 Work Environment

Office Type: Joom's office in Lisbon is a modern, collaborative workspace designed to facilitate teamwork and innovation. The office is equipped with state-of-the-art technology and provides a comfortable, ergonomic work environment.

Office Location(s): Lisbon, Portugal. Joom also has offices in China, Brazil, Portugal, Latvia, and Germany.

Workspace Context:

  • Collaboration: The office is designed to facilitate collaboration, with open-plan workspaces, meeting rooms, and breakout areas.
  • Technology: The office is equipped with high-speed internet, multiple monitors, and other tools to support productive work.
  • Accessibility: The office is located in a central part of Lisbon, with easy access to public transportation and other amenities.

Work Schedule: The role follows an office-first approach, with flexible hours and the possibility to work remotely up to 52 days per year. The role requires a strong commitment to team collaboration and communication, with a focus on delivering high-quality work.

📝 Enhancement Note: Joom's work environment is designed to support collaboration, innovation, and productivity. The office provides a comfortable, ergonomic workspace with state-of-the-art technology. The role offers a flexible work schedule, with opportunities for remote work and flexible hours.

📄 Application & Technical Interview Process

Interview Process:

  1. Phone/Video Screen: A brief conversation to discuss your background, experience, and motivation for the role.
  2. Technical Challenge: A hands-on challenge to assess your technical skills and problem-solving abilities. The challenge may involve infrastructure automation, cloud services, or networking tasks.
  3. On-site Interview: A visit to Joom's Lisbon office to meet the team, discuss the role in more detail, and complete a technical deep dive.
  4. Final Decision: A decision will be made based on your technical skills, cultural fit, and alignment with Joom's values.

Portfolio Review Tips:

  • Highlight your experience with infrastructure automation, cloud services, and networking through relevant projects.
  • Showcase your ability to design, implement, and maintain scalable, reliable, and secure infrastructure.
  • Include case studies that demonstrate your problem-solving skills and ability to troubleshoot complex infrastructure issues.
  • Emphasize your understanding of Joom's tech stack and your ability to work with the team to drive system improvements.

Technical Challenge Preparation:

  • Brush up on your knowledge of Python, Go, Kubernetes, AWS, and other relevant technologies.
  • Practice infrastructure automation, cloud services, and networking tasks to ensure you are comfortable with the technical challenge.
  • Prepare for a technical deep dive, focusing on your understanding of system design, architecture, and troubleshooting.

ATS Keywords: See the comprehensive list of web development and server administration-relevant keywords for resume optimization, organized by category, at the end of this document.

📝 Enhancement Note: Joom's interview process is designed to assess your technical skills, problem-solving abilities, and cultural fit. The process involves a phone/video screen, technical challenge, on-site interview, and final decision. The portfolio review and technical challenge preparation tips are tailored to the specific requirements of this role.

🛠 Technology Stack & Web Infrastructure

Frontend Technologies: N/A (This role is focused on backend and infrastructure technologies)

Backend & Server Technologies:

  • Programming Languages: Python, Go
  • Infrastructure as Code (IaC): Terraform, Terragrunt
  • Configuration Management: Ansible, AWX
  • Containerization: Docker
  • Orchestration: Kubernetes (K8s)
  • Cloud Platforms: AWS, other cloud platforms
  • Monitoring & Logging: ELK, Loki, Prometheus, Victoria Metrics
  • Networking: IPSEC, dynamic routing protocols, FreeIPA/Kerberos/LDAP, Keycloak/OIDC/SSO

Development & DevOps Tools:

  • Version Control: Git
  • CI/CD: Jenkins
  • Artifact Management: JFrog
  • Infrastructure Automation: Packer
  • Cloud Storage: S3

📝 Enhancement Note: Joom's technology stack is focused on backend and infrastructure technologies. The stack includes tools for infrastructure automation, cloud services, and networking. Familiarity with these tools is essential for success in this role.

👥 Team Culture & Values

Web Development Values:

  • Reliability: Joom values reliability in its infrastructure and expects its engineers to design, implement, and maintain reliable systems.
  • Scalability: Joom's infrastructure must be able to scale to meet the demands of a growing business. Engineers are expected to design systems with scalability in mind.
  • Security: Joom takes security seriously and expects its engineers to follow best practices for securing infrastructure components.
  • Collaboration: Joom values collaboration and expects its engineers to work closely with other teams to ensure infrastructure meets their needs.

Collaboration Style:

  • Cross-functional Integration: The Basic Infrastructure team works closely with development, QA, and other teams to ensure infrastructure meets their needs.
  • Code Review Culture: The team follows a code review process to ensure high-quality work and knowledge sharing.
  • Peer Programming: The team encourages peer programming and pair work to facilitate knowledge sharing and skill development.

📝 Enhancement Note: Joom's culture is dynamic, collaborative, and focused on driving innovation in the e-commerce industry. The company values reliability, scalability, security, and collaboration in its infrastructure. The Basic Infrastructure team works closely with other teams to ensure infrastructure meets their needs and supports the company's mission.

⚡ Challenges & Growth Opportunities

Technical Challenges:

  • Infrastructure Automation: Design, implement, and maintain infrastructure as code using tools like Terraform and Terragrunt.
  • Cloud Services: Work with cloud services like AWS to ensure the scalability, reliability, and security of Joom's infrastructure.
  • Networking: Troubleshoot and resolve complex networking issues, including technologies like IPSEC and dynamic routing protocols.
  • Observability: Improve the observability of Joom's infrastructure, ensuring that issues are quickly identified and resolved.

Learning & Development Opportunities:

  • Technical Skill Development: This role provides opportunities for technical skill development in areas like infrastructure automation, cloud services, and networking.
  • Conference Attendance: Joom encourages employees to attend industry conferences and events to stay up-to-date with emerging technologies and best practices.
  • Technical Mentoring: The Basic Infrastructure team provides opportunities for technical mentoring, with experienced engineers sharing their knowledge and skills with junior team members.

📝 Enhancement Note: This role presents significant technical challenges and opportunities for growth. Candidates can expect to work on complex infrastructure problems, drive system improvements, and gain exposure to a wide range of technologies and teams. The role offers significant potential for technical and career growth.

💡 Interview Preparation

Technical Questions:

  • Infrastructure Automation: Be prepared to discuss your experience with infrastructure automation, including tools like Terraform, Terragrunt, and Ansible.
  • Cloud Services: Demonstrate your understanding of cloud services like AWS, including their features, limitations, and best practices.
  • Networking: Showcase your knowledge of networking, including technologies like IPSEC and dynamic routing protocols.
  • Troubleshooting: Be prepared to discuss your approach to troubleshooting complex infrastructure issues and improving system observability.

Company & Culture Questions:

  • Company Mission: Demonstrate your understanding of Joom's mission to transform global trade and explain how this role supports that mission.
  • Team Dynamics: Showcase your ability to work collaboratively with other teams, including development, QA, and other infrastructure teams.
  • Problem-Solving: Provide examples of your problem-solving skills and your ability to drive system improvements in a dynamic, fast-paced environment.

Portfolio Presentation Strategy:

  • Project Selection: Choose projects that demonstrate your experience with infrastructure automation, cloud services, and networking.
  • Case Studies: Include case studies that highlight your ability to design, implement, and maintain scalable, reliable, and secure infrastructure.
  • Technical Deep Dive: Prepare for a technical deep dive, focusing on your understanding of system design, architecture, and troubleshooting.

📝 Enhancement Note: Joom's interview process is designed to assess your technical skills, problem-solving abilities, and cultural fit. The process involves a phone/video screen, technical challenge, on-site interview, and final decision. The portfolio review and technical challenge preparation tips are tailored to the specific requirements of this role.

📌 Application Steps

To apply for this DevOps / Site Reliability Engineer position:

  1. Submit Your Application: Click on the application link and submit your resume, portfolio, and any other relevant documents.
  2. Prepare Your Portfolio: Customize your portfolio to highlight your experience with infrastructure automation, cloud services, and networking. Include case studies that demonstrate your problem-solving skills and ability to drive system improvements.
  3. Optimize Your Resume: Tailor your resume to emphasize your technical skills, experience, and alignment with Joom's values. Include relevant keywords to improve your visibility in applicant tracking systems (ATS).
  4. Research Joom: Learn about Joom's mission, values, and culture. Prepare for interview questions that assess your understanding of the company and your fit with the team.

📝 Enhancement Note: Joom's application process is designed to assess your technical skills, problem-solving abilities, and cultural fit. The process involves submitting your application, preparing your portfolio, optimizing your resume, and researching Joom. The portfolio review and technical challenge preparation tips are tailored to the specific requirements of this role.


Comprehensive List of Web Development and Server Administration-Relevant Keywords

Programming Languages:

  • Python
  • Go
  • JavaScript
  • TypeScript
  • Java
  • C#
  • C++
  • Ruby
  • PHP
  • Swift
  • Kotlin

Web Frameworks:

  • React
  • Angular
  • Vue.js
  • Node.js
  • Express
  • Django
  • Flask
  • Ruby on Rails
  • Laravel
  • Symfony
  • Spring Boot
  • ASP.NET
  • Phoenix
  • Elixir

Server Technologies:

  • Nginx
  • Apache
  • Tomcat
  • JBoss
  • WildFly
  • IIS
  • LiteSpeed
  • Caddy
  • Traefik
  • HAProxy
  • Varnish
  • Redis
  • Memcached
  • PostgreSQL
  • MySQL
  • MongoDB
  • MariaDB
  • SQLite
  • Oracle
  • SQL Server
  • AWS RDS
  • Google Cloud SQL
  • Azure SQL Database
  • AWS DynamoDB
  • Google Cloud Firestore
  • Azure Cosmos DB
  • AWS Redshift
  • Google BigQuery
  • Azure Synapse Analytics
  • Kafka
  • RabbitMQ
  • Apache Kafka
  • ActiveMQ
  • RabbitMQ
  • Apache Camel
  • MuleSoft
  • AWS SQS
  • Google Cloud Pub/Sub
  • Azure Service Bus
  • AWS SNS
  • Google Cloud Pub/Sub
  • Azure Event Grid
  • AWS Lambda
  • Google Cloud Functions
  • Azure Functions
  • AWS API Gateway
  • Google Cloud Endpoints
  • Azure API Management
  • AWS AppSync
  • Google Cloud Firestore
  • Azure Cosmos DB
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud DNS
  • Azure DNS
  • AWS Certificate Manager
  • Google Cloud Certificate Manager
  • Azure Key Vault
  • AWS Secrets Manager
  • Google Cloud Secret Manager
  • Azure Key Vault
  • AWS IAM
  • Google Cloud IAM
  • Azure Active Directory (Azure AD)
  • AWS Cognito
  • Google Cloud Identity Platform
  • Azure Active Directory (Azure AD)
  • AWS Amplify
  • Google Cloud Functions
  • Azure App Service
  • AWS Elastic Beanstalk
  • Google Cloud Run
  • Azure App Service
  • AWS Elastic Kubernetes Service (EKS)
  • Google Kubernetes Engine (GKE)
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Container Service (ECS)
  • Google Cloud Run
  • Azure Container Instances (ACI)
  • AWS Fargate
  • Google Cloud Run
  • Azure Kubernetes Service (AKS)
  • AWS Elastic Load Balancing (ELB)
  • Google Cloud Load Balancing
  • Azure Load Balancer
  • AWS Route 53
  • Google Cloud

Application Requirements

Candidates should have strong knowledge of Python or Go for infrastructure task automation and experience with Kubernetes. A good understanding of networking and experience with cloud services like AWS is also required.