Azure DevOps/Infrastructure and Security Architect

  • Brentwood, TN
  • Posted 14 days ago | Updated 2 hours ago

Overview

On Site
Hybrid
$85
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 6+ Month(s)

Skills

Azure DevOps
Network Security

Job Details

Role: Azure DevOps/Infrastructure and Security Architect

Location: REMOTE

Duration: 6+ Months

  • In-depth knowledge of Azure DevOps services like Azure Repos, Azure Pipelines, Azure Artifacts, and Azure Boards for managing data pipelines.
  • Understanding of data processing paradigms, data warehousing, data lakes, and big data technologies relevant to Azure data services.
  • Proficiency in YAML to build pipeline.
  • Familiarity with IaC tools like ARM templates or Bicep to manage and provision Azure resources for data pipelines.
  • Experience with Git for version control of data engineering artifacts.
  • Knowledge of tools and techniques for monitoring data pipelines and setting up alerts within Azure DevOps.
  • In-depth knowledge of core Azure services for data engineering: This includes Azure Data Lake Storage (ADLS), Azure Blob Storage, Azure Data Factory (ADF), Azure Databricks, Azure Synapse Analytics, and Azure VMs. Understanding their functionalities, strengths, and limitations is crucial for making informed choices when building your infrastructure.
  • Familiarity with IaC tools like ARM templates or Bicep: These tools allow you to define and manage your Azure infrastructure in a code-driven way, ensuring consistency and repeatability.
  • Data Access Control: Knowledge of access control mechanisms in Azure, like Azure Active Directory (AAD) and role-based access control (RBAC), to restrict access to data based on the least privilege principle.
  • Secure Infrastructure as Code (IaC): Writing secure IaC templates (ARM or Bicep) that adhere to security best practices like following the principle of least privilege for service identities.
  • Network Security: Basic understanding of network security concepts like firewalls and network security groups (NSGs) to restrict access to data resources.