Home Job Postings AWS CloudOps Engineer This topic has replies, 0 voices, and was last updated 6 days ago by admin. Now Editing “AWS CloudOps Engineer” Name * Password * Email Topic Title (Maximum Length 80) Company * Location Expires at <strong>AWS CloudOps Engineer</strong> 근무지: Plano, TX 형태: 1년 계약직 급여: $54/hr (DOE) 통신 및 대용량 데이터 환경에서 AWS 및 하이브리드 클라우드 운영을 담당할 시니어 CloudOps 포지션입니다. <strong>주요 업무</strong> AWS + 온프레미스 하이브리드 아키텍처 설계 및 운영 (VPN, Direct Connect 등) VPC, PrivateLink 등 활용한 보안 네트워크 구축 4G/5G 데이터 파이프라인 운영 (대용량 데이터 처리) EC2, ECS/EKS 기반 서비스 운영 인프라 자동화 (Terraform, CloudFormation) 모니터링 및 장애 대응 (CloudWatch 등) 비용 최적화 및 백업/DR 설계 <strong>자격 요건</strong> AWS CloudOps/Infra 운영 경력 6년 이상 네트워크 및 Linux 환경 이해도 컨테이너(ECS/EKS), IaC 경험 데이터 파이프라인 및 보안 운영 경험 <strong>기술 스택</strong> AWS: EC2, VPC, S3, RDS, Lambda 등 Networking: VPN, Transit Gateway, Route 53 IaC/CI-CD: Terraform, CloudFormation, Jenkins 기타: Linux, Bash, SFTP <strong>📩 지원: Jenniferk@sbtgus.com</strong> <strong>AWS CloudOps Engineer</strong> Working Location: Plano, TX Contract Period: 1 year Pay rate: $54/hr DOE Senior CloudOps Engineer with 6+ years of experience operating carrier-grade AWS and hybrid cloud platforms supporting telecom, data engineering, and high-throughput network workloads. Specialized in AWS–on-prem integration, private networking, secure data movement, and cost-controlled production operations. Job Description Designed and operated hybrid AWS + on-prem architectures using Site-to-Site VPN, Direct Connect, Transit Gateway, and private routing for telecom data flows Built secure, isolated VPC environments for multiple customers using VPC peering, PrivateLink, NLB/ALB, and Route 53 private DNS Supported telecom data pipelines (4G/5G RAN, KPI feeds, CDRs) ingesting TB-scale data into AWS via SFTP, private links, and batch pipelines Owned production EC2 and container platforms (ECS/EKS) running analytics, monitoring, and customer-facing services Implemented network-level security using Security Groups, NACLs, firewall rules, private subnets, and endpoint policies Built high-availability and failover designs across Availability Zones and regions for customer-critical services Led incident response and RCA for network failures, SFTP outages, latency issues, and data pipeline disruptions Automated infrastructure using Terraform and CloudFormation for VPCs, routing, IAM, and service deployments Implemented end-to-end observability for network, compute, and data pipelines using CloudWatch, Prometheus, and centralized logging Controlled AWS and data-transfer costs through right-sizing, Savings Plans, S3 lifecycle policies, and cost dashboards Designed backup and DR for both cloud and hybrid workloads using snapshots, replication, and cross-region restores Qualifications AWS & Platform Stack Compute & Containers : EC2, Auto Scaling, ECS, EKS, Lambda Networking & Connectivity : VPC, Transit Gateway, PrivateLink, ALB, NLB, Route 53, VPN, Direct Connect Storage & Database: S3, EBS, EFS, Glacier/ RDS, Aurora, DynamoDB Security & Identity: IAM, KMS, Secrets Manager, GuardDuty, CloudTrail, Config Infrastructure as Code & CI/CD: Terraform, CloudFormation, GitHub Actions, Jenkins OS & Networking Skills : Linux, Bash, Networking, Firewalls, SFTP, Private Routing Please send your resume to —— Jenniferk@sbtgus.com ———————————- I agree to the terms of service Update List