Design and Architect Solutions: Translate business requirements into secure, scalable, and highly available cloud architecture designs
Provision Resources: Design, deploy, and configure cloud resources, including virtual machines, networking components (VPCs/VNets, firewalls, load balancers), and storage services (S3, Azure Blob, etc.)
Implement Infrastructure as Code (IaC): Use tools like Terraform, Ansible, or CloudFormation to automate the provisioning, configuration, and management of cloud infrastructure
Monitoring and Troubleshooting: Implement and manage monitoring tools (e.g., CloudWatch, Azure Monitor) to ensure the health, performance, and availability of cloud systems
Cost Management: Monitor cloud resource usage, identify inefficiencies, and implement strategies for cost optimization (e.g., right-sizing instances, managing reserved instances)
Automation: Develop scripts (using Python, Bash, or PowerShell) and utilize CI/CD pipelines to automate routine tasks, deployments, and operational workflows
Disaster Recovery: Design, implement, and regularly test backup and Disaster Recovery (DR) strategies to ensure business continuity
Implement Security Controls: Configure and enforce security controls such as Identity and Access Management (IAM), network security policies, and data encryption
Ensure Compliance: Work to ensure the cloud environment adheres to internal governance policies and external industry regulations (e.g., HIPAA, GDPR, SOC 2)
Collaboration: Work closely with the Security team (or Cloud Security Engineers) to address vulnerabilities and incidents
คุณสมบัติ
เพศ : ไม่ระบุ
อายุ(ปี) : ไม่จำกัด
ระดับการศึกษา : ปริญญาตรี ขึ้นไป
ประสบการณ์(ปี) : 5ปีขึ้นไป
คุณสมบัติด้านความรู้และความสามารถ
Infrastructure as Code (IaC): Proficiency with tools like Terraform or CloudFormation to provision and manage infrastructure securely and repeatably
Networking: Strong understanding of cloud networking components (VPCs, subnets, routing, firewalls, and segmentation)
Identity & Access Management (IAM): Mastery of least-privilege principles and configuring roles/permissions securely
Compliance: Knowledge of relevant security standards and regulations (e.g., HIPAA, GDPR, SOC 2)