| Skills | No. of years of Experience | Detailed Write Up |
| Total No. of Years of Experience | | |
| Total No. of Years of Experience as an Azure Dev Ops System Engineer | | |
| Must be a hands-on Microsoft Azure System Engineer | | |
| Must have Azure Key Vault (Premium) | | |
| Must have Terraform | | |
| Must have Bicep | | |
| Must have worked on Azure DevOps (ADO) | | |
| Must have Azure infra using IaC. | | |
| Must have Implementing CI/CD pipelines in Azure DevOps for infrastructure deployments. | | |
| Must have Azure Private End points | | |
| Must have Azure Networking Git | | |
| Must have Service Principals | | |
| Must have RBAC | | |
| Must have Landing Zones (Very important. Experience standing up and managing Azure landing zones | | |
| Build pipelines, deploying to Azure resources and Saas products | | |
| Experience with set/troubleshoot security mechanisms like mTLS | | |
| Must have AppInsights experience | | |
| Experience with certificate management, manual and implementing automation | | |
| Experience with PowerShell | | |
| Familiarity with IAM and user authentication (such as oauth and SAML) is preferred | | |
| Experience with ServiceNow preferred | | |
| Strong troubleshooting skills required | | |
| Proactive ownership of the system engineer space is necessary, including identifying and prioritizing work as a recommended roadmap | | |
| Managing role-based access control (RBAC) and service principal configurations. | | |
| Collaborating with architects and security teams to ensure compliance with encryption and networking standards. | | |
| Troubleshooting pipeline failures and network access issues (e.g., firewall and private endpoint configurations) | | |
| Supporting sandbox, dev, and environment-specific infrastructure deployments. | | |
| Have you worked on modernizing CIAM infrastructure in Azure by implementing secure, scalable, and compliant cloud-native solutions. The initiative includes provisioning and deploying infrastructure using Terraform and Bicep. The objective is to enhance encryption, strengthen security controls, and ensure high availability and compliance with enterprise security standards. | | |
| Willing to work on On Call rotation | | |