Home

Urgent require_ AWS Admin _ Columbus OH_ Onsite at Columbus, Wisconsin, USA
Email: [email protected]
From:

Mohit,

Spar

[email protected]

Reply to:   [email protected]

Hello;

AWS Senior Admin

Columbus, OH (Day1 onsite and Hybrid) For initial 2-3 months it will remote

Long Term

Job Description:

AWS Team

Run

1. Day to day admin of Datalake

a. Provision new resources

b. VPC maintenance

2. Cost savings activities

a. Identify unused resources and decom

b. Right-size compute resources using Densify/Compute Optimizer data

c. Right-size storage resources

d. Purchase Savings Plans and RIs for multiple services

3. Annual certificate installation for AWS accounts

4. Route53 administration (shared with ServerSupport)

5. Billing data management and reporting

6. AWS remediation activity coordination

7. Management of AWS security perimeter/Sophos UTM administration for complex asks

8. Migration of on-prem servers to AWS

9. Approval of SNOW requests for AWS access

10. AWS workspace provisioning support

11. Administration of CPM, ensure backups are performed and all instances are tagged with appropriate backup settings

12. AWS AMI cleanup done monthly by manual means

13. AWS FSx file systems management for H: (all users), handful of F: and P: folders

14. MFA card provisioning/storage

Engineering:-

1. Expert support/troubleshooting for dev teams/product teams/data lake using AWS resources

2. Expert support/troubleshooting for Terraform serverless deployments in main account

3. Expert support/troubleshooting for RPA team

4. Management of QA accounts and auto-scaling QA infrastructure setup/support

5. New account provisioning/deprovisioning

6. Security Group administration (taken away from ServerSupport due to inability to properly administer groups)

7. SCP Policy administration and changes

8. Sophos UTM upgrades (modifications to cloudformation stacks to fit our deployment model)

9. Management of AWS security roles/policies

10. Management of AWS networking (VPCs, route tables, direct connects, peering links, transit gateways)

11. Support/drive  integration efforts (see below)

12. Administration of AWS feeds to Splunk

a. VPC via Firehose (all subaccounts and us-west-2)

b. Lambda Cloudwatch via Firehose (all subaccounts and us-west-2)

c. Guardduty Kinesis stream via Lambda

d. Cloudtrails Cloudwatch via Firehose

e. ELB Classic and Application S3 logs via Lambda

f. S3 log files via Lambda

g. Cloudfront S3 logs via Lambda

13. CPM (Cloud Protection Manager) maintenance and upgrades

14. Lambda automated task creation and administration

a. Detached volume cleanup

b. CPM backups restoration usage

c. Log forwarding setup

d. Unhealthy instance detection and remediation

e. Aging snapshot cleanup

f. Verify certs on loadbalancers and in ACM

g. Removal of unused IP addresses / report on IP

15. Administration of Logrocket infrastructure

a. Monitoring for critical events

b. Upgrade of logrocket application via Kubernetes Helm charts from vendor

c. Detached network interfaces cleanup

16. Linux system patching (all done within AWS)

17. Nucleus SQL S3 backup verification alert

18. get_keys.py development and support (used by teams to procure temporary credentials via SAML login)

Ongoing efforts:-

1. Integration of AWS account data with  FinOps teams and Densify tool (in progress)

2. Alignment of SA AWS footprint to  CIS standards compliance (in progress)

3. AWS accounts to  Radar system for detection only (in progress, just started)

4. AWS security group remediations (to fix SGs that are far too open) 

AWS Skills/Familiarity:

S3

Lambda Functions (python in particular)

API Gateway

SecretsManager

EC2/EBS

ECS (Elastic Container Service)

ELB (Classic, ALB, NLB)

Amazon SSM (patching/ management)

Cloudwatch

Cloudtrails

Route53

RDS (MS SQL, Aurora MySQL in particular, PostgreSQL for Logrocket and Artifactory)

DynamoDB

EMR

Amazon Glue

Autoscaling Groups

Security Group administration

IAM Roles/Policies

S3 bucket policies

VPC

EventBridge

Kinesis

GuardDuty

Workspaces

FSx

EKS - Kubernetes

SQS

SNS

Elasticache

Transit Gateway

Other Skills:

Python 3.x development

Sophos UTM Autoscaling Administration

Network troubleshooting and protocol analysis

Hashicorp Terraform development/deployment

Preferred Certification:

AWS Solutions architect

Keywords: quality analyst sthree information technology microsoft Ohio
[email protected]
View all
Thu Jan 26 19:53:00 UTC 2023

To remove this job post send "job_kill 310677" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 25

Location: , Ohio