Home

Required Lead Kubernetes Engineer for Remote role -USC,GC ONLY at Remote, Remote, USA
Email: [email protected]
From:

Pankaj,

kpg99

[email protected]

Reply to:   [email protected]

Hi,

Hope you are doing well.

Please find the job description below and let me know your interest.

Position: Lead Kubernetes Engineer

Location: Remote

Duration: 6+ Months

Mode of Interview: Phone and Video

Job Description:

Sr. enterprise kubernetes architect. This is super hands on so we agreed to call it a lead role until they convert. They need to be able to design, but deploy and do the hands on work.

Lead Engineer that can design

Kubernetes/Container skills is the MOST important.

Cloud would prefer multiple cloud experience. Preference of skill set in this order

Azure - most important for this role

AWS - they have a lot of AWS but have AWS support as well so good experience here but would rather than have more working knowledge designing, deploying containers in Azure

GCP

Culture:

Follow Agile,

Some microservicves

Have a product owner and scrum master

Not super high output team yet

No micromanaging

Enterprise background

Caveat is bc of all the politics and cross team pollination

Work really hard to get requirements, contact with customers

Not a simple chat message

Technically agile

Backlog grooming and demos

Next gen cloud

Middle to high on agile performance

Certification preference

CKA and CKS would be a huge plus

Job Description: Lead Kubernetes Engineer

Preferred Certifications:

            Certified Kubernetes Administrator (CKA)

            Certified Kubernetes Security Specialist (CKS)

            Certified Kubernetes Application Developer (CKAD)

            Description The Enterprise Kubernetes and Cloud Solutions Architect Senior Manager will focus on architecting, designing, documenting, implementing, and managing individual contributors for all services owned by the Container Management and Security pillar of the NextGen Cloud program. Containers as a Service (CaaS) and Clusters as a Service (CLaaS) are the two core services the pillar currently provides, with additional services coming in the future. These services are supported and managed by many technologies that have been woven together to form enterprise services for consumption by the entirety of the PwC Network of Firms.

Requirements

            Understanding of Kubernetes, Docker, container images, and container security; Understanding of cloud-native concepts and the Cloud Native Computing Foundation (CNCF) Landscape;

            Understanding of at least one cloud provider and its underlying container services; Amazon Web Services Amazon Elastic Kubernetes Service (EKS) Amazon Elastic Container Service (ECS) AWS Fargate Microsoft Azure Azure Kubernetes Service (AKS) App Service Container Instances Google Cloud Google Kubernetes Engine (GKE) Cloud Run

            Working knowledge of at least one Kubernetes distribution; Amazon Elastic Kubernetes Service (EKS) Azure Kubernetes Service (AKS) Google Kubernetes Engine (GKE) Rancher / Rancher Kubernetes Engine (RKE) / K3s Red Hat OpenShift VMware Tanzu Kubernetes Grid (TKG) Mirantis Kubernetes Engine Nutanix Karbon Rafay

            Working knowledge of at least one service mesh technology; Istio Linkerd Kong Mesh / Kong Kuma HashiCorp Consul Connect AWS App Mesh OpenShift Service Mesh (Red Hat) Open Service Mesh (OSM)

            Demonstrating Familiarity with at least one Kubernetes security tool; Aqua Platform / Container Security / Kubernetes Security / Dynamic Threat Analysis Prisma Compute (previously Twistlock) Qualys Container Security Snyk Cloud Native Application Security (CNAS) StackRox Kubernetes Security Platform Sysdig Secure

            Demonstrating Familiarity with at least one container image scanning tool; Anchore Aqua Security / Trivy Clair Dagda Falco JFrog Xray Qualys Container Security

            Working knowledge of at least one container registry; Amazon Elastic Container Registry (ECR) Azure Container Registry (ACR) GitLab Container Registry Google Cloud Container Registry Harbor JFrog Container Registry

            Possessing Intimate understanding of the typical Kubernetes resources and how to create manifests defining them; ConfigMap DaemonSet Deployment Ingress PersistentVolume (PV) PersistentVolumeClaim (PVC) Pod ReplicaSet Secret Service

StatefulSet

            Working knowledge of at least one Container Network Interface (CNI) driver; Amazon VPC CNI Azure CNI Calico Canal Cilium Flannel GKE CNI

Weave

            Working knowledge of at least one Container Storage Interface (CSI) driver; AWS Elastic Block Storage (EBS) AWS Elastic File System (EFS) AWS FSx for Lustre (FSX) Azure Disk Azure File CephFS Ceph RBD GCE Persistent Disk Google Cloud Filestore Google Cloud Storage GlusterFS Longhorn Minio NetApp Nutanix OpenEBS Portworx Pure Storage CSI Scaleway CSI vSphere

            Demonstrating Intimate understanding of cloud networking concepts, including best-practices networking models and security; Understanding of microservice architecture and best practices; Working knowledge of creating a Dockerfile to build an OCI-compliant Docker / container image;

            Demonstrating the Ability to automate processes using Continuous Integration /Continuous Delivery (CI/CD) tools; Airflow Argo CD AWS CodePipeline Azure DevOps CircleCI Codefresh Concourse Flux CD / Flagger GitHub Actions GitLab Harness Jenkins / Jenkins X Spinnaker Tekton Travis CI

            Understanding of observability in Kubernetes using three or more tools from the following list Prometheus Grafana Alertmanager Elasticsearch Fluentd / Fluent Bit Kibana AppDynamics Datadog Dynatrace New Relic One Sumo Logic

            Working knowledge of all the following command line interface (CLI) tools; git helm kubectl

            Preferred: Working knowledge of the following; Python Golang / Go Bash HashiCorp Terraform / HashiCorp Configuration Language (HCL) Kubernetes Operators HashiCorp Vault Zero Trust Architecture (ZTA) Blue/green deployments, canary deployments Automated testing (ex: unit testing, integration testing, smoke testing)

            Experiencing working in a highly-regulated, highly-secure industry; SOC2 Information Security Policy (ISP) Controls

            Additional Responsibilities: Overseeing Architect, design, document, and implement leading edge enterprise solutions using cloud-native technologies and security best practices to deliver business value for internal customers at PwC;

            Collaborating with internal customers at PwC to gather business and technical requirements; Collaborating with various NextGen Cloud workstreams to create comprehensive enterprise solutions; Providing wisdom and direction to team members to accelerate the teams throughput and improve the quality of deliverables; Leading architecture and design workshops; and, Creating security standards and work with relevant teams to enforce those standards

Keywords: continuous integration continuous deployment information technology golang
[email protected]
View all
Mon Jan 09 17:39:00 UTC 2023

To remove this job post send "job_kill 257375" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,