RANDSTAD USA Infrastructure as Code (IaC) Engineer -1042 in Grand Rapids, MI

pin
pin
job summary: We are seeking an experienced Infrastructure as Code (IaC) Engineer (Contract) to support a centralized cloud enablement team responsible for building, deploying, and operating standardized AWS infrastructure using Terraform, Spacelift, Rundeck, and GitHub. This role focuses on creating and maintaining reusable IaC patterns, build and deployment automation, and governance controls that enable secure, scalable self-service infrastructure acros
[ "
  • Design, build, and maintain Terraform modules and IaC patterns used by multiple delivery teams.
  • Implement and operate Terraform deployments via Spacelift, including stack design, approvals, drift detection, and environment promotion.
  • Develop and maintain Rundeck jobs for AWS operational automation, break-glass actions, and platform support workflows.
  • Build and support GitHub-based CI/CD pipelines using GitOps principles (PR-driven change control).
  • Establish and enforce AWS standards for:
  • Account structure and environments
  • Tagging, cost allocation, and ownership
  • Security, access control, and auditability
  • Implement secure automation using IAM roles, OIDC, and least-privilege access.
  • Collaborate with application and platform teams to onboard workloads to standardized IaC tooling.
  • Produce and maintain documentation, runbooks, and onboarding guides.
  • Troubleshoot IaC, pipeline, and automation failures; participate in root cause analysis as needed.


" ]
[ "Infrastructure as Code (Terraform)\r\n\r\n5 years of hands-on Terraform experience in production AWS environments.\r\nAdvanced experience with: \r\nModule design, reuse, and versioning\r\nRemote state using S3 and DynamoDB\r\nMulti-account and multi-environment deployments\r\nStandards enforcement via validation and lifecycle rules\r\nExperience supporting centralized Terraform modules consumed by many teams.\r\n \r\n\r\nAWS Cloud Expertise\r\n\r\nStrong, practical experience with: \r\nAWS Organizations, SCPs, and multi-account strategies\r\nCross-account IAM role design\r\nAccount bootstrap / landing zone concepts\r\nHands-on experience provisioning AWS services via Terraform, including: \r\nIAM\r\nVPC and networking\r\nEC2 / Auto Scaling\r\nEKS or ECS (working knowledge)\r\nS3, RDS\r\nCloudWatch and logging\r\nKMS and encryption\r\n \r\n\r\nSpacelift (Terraform Orchestration)\r\n\r\nProduction experience using Spacelift for Terraform: \r\nStack and dependency design\r\nEnvironment promotion and approvals\r\nWorker configuration (private or AWS-hosted preferred)\r\nDrift detection and scheduled runs\r\nExperience integrating Spacelift with AWS IAM and GitHub workflows.\r\n \r\n\r\nRundeck (Operational Automation)\r\n\r\nExperience designing and operating Rundeck jobs for AWS infrastructure operations.\r\nStrong understanding of: \r\nJob security, RBAC, and approvals\r\nCredential management using IAM roles (no static keys)\r\nError handling, retries, and notifications\r\nFamiliarity with job-as-code or version-controlled job patterns.\r\n \r\n\r\nGitHub & CI/CD\r\n\r\nEnterprise GitHub experience, including: \r\nBranch protection rules and CODEOWNERS\r\nRequired reviews and PR-based change control\r\nGitHub Actions for CI/CD\r\nOIDC-based authentication to AWS\r\nStrong understanding of GitOps delivery models.\r\n \r\n\r\nSecurity & Compliance\r\n\r\nExperience implementing: \r\nLeast-privilege IAM and permission boundaries\r\nSecure secrets handling (no credentials in code)\r\nApproval workflows and separation of duties\r\nAbility to embed security and compliance into IaC pipelines rather than manual processes.\r\nExperience in regulated or risk-sensitive environments strongly preferred.\r\n \r\n\r\nOperational & Collaboration Skills\r\n\r\nStrong troubleshooting and operational mindset.\r\nExperience supporting shared platforms used by many teams.\r\nAbility to document solutions clearly and enable team adoption.\r\nStrong communication skills and comfort working with cross-functional stakeholders." ]
We are seeking an experienced Infrastructure as Code (Ia. C) Engineer (Contract) to support a centralized cloud enablement team responsible for building, deploying, and operating standardized AWS infrastructure using Terraform, Spacelift, Rundeck, and GitHub. This role focuses on creating and maintaining reusable Ia. C patterns, build and deployment automation, and governance controls that enable secure, scalable self-service infrastructure acros[ "Design, build, and maintain Terraform modules and Ia. C patterns used by multiple delivery teams. Implement and operate Terraform deployments via Spacelift, including stack design, approvals, drift detection, and environment promotion. Develop and maintain Rundeck jobs for AWS operational automation, break-glass actions, and platform support workflows. Build and support GitHub-based CI/ CD pipelines using Git. Ops principles (PR-driven change control). Establish and enforce AWS standards for: Account structure and environments. Tagging, cost allocation, and ownership. Security, access control, and auditability. Implement secure automation using IAM roles, OIDC, and least-privilege access. Collaborate with application and platform teams to onboard workloads to standardized Ia. C tooling. Produce and maintain documentation, runbooks, and onboarding guides. Troubleshoot Ia. C, pipeline, and automation failures; participate in root cause analysis as needed." ][ "Infrastructure as Code (Terraform)\r\n\r\n 5 years of hands-on Terraform experience in production AWS environments.\r\n. Advanced experience with: \r\n. Module design, reuse, and versioning\r\n. Remote state using S 3 and Dynamo. DB\r\n. Multi-account and multi-environment deployments\r\n. Standards enforcement via validation and lifecycle rules\r\n. Experience supporting centralized Terraform modules consumed by many teams.\r\n \r\n\r\n. AWS Cloud Expertise\r\n\r\n. Strong, practical experience with: \r\n. AWS Organizations, SCPs, and multi-account strategies\r\n. Cross-account IAM role design\r\n. Account bootstrap / landing zone concepts\r\n. Hands-on experience provisioning AWS services via Terraform, including: \r\n. IAM\r\n. VPC and networking\r\n. EC 2 / Auto Scaling\r\n. EKS or ECS (working knowledge)\r\n. S 3, RDS\r\n. Cloud. Watch and logging\r\n. KMS and encryption\r\n \r\n\r\n. Spacelift (Terraform Orchestration)\r\n\r\n. Production experience using Spacelift for Terraform: \r\n. Stack and dependency design\r\n. Environment promotion and approvals\r\n. Worker configuration (private or AWS-hosted preferred)\r\n. Drift detection and scheduled runs\r\n. Experience integrating Spacelift with AWS IAM and GitHub workflows.\r\n \r\n\r\n. Rundeck (Operational Automation)\r\n\r\n. Experience designing and operating Rundeck jobs for AWS infrastructure operations.\r\n. Strong understanding of: \r\n. Job security, RBAC, and approvals\r\n. Credential management using IAM roles (no static keys)\r\n. Error handling, retries, and notifications\r\n. Familiarity with job-as-code or version-controlled job patterns.\r\n \r\n\r\n. GitHub & CI/ CD\r\n\r\n. Enterprise GitHub experience, including: \r\n. Branch protection rules and CODEOWNERS\r\n. Required reviews and PR-based change control\r\n. GitHub Actions for CI/ CD\r\n. OIDC-based authentication to AWS\r\n. Strong understanding of Git. Ops delivery models.\r\n \r\n\r\n. Security & Compliance\r\n\r\n. Experience implementing: \r\n. Least-privilege IAM and permission boundaries\r\n. Secure secrets handling (no credentials in code)\r\n. Approval workflows and separation of duties\r\n. Ability to embed security and compliance into Ia. C pipelines rather than manual processes.\r\n. Experience in regulated or risk-sensitive environments strongly preferred.\r\n \r\n\r\n. Operational & Collaboration Skills\r\n\r\n. Strong troubleshooting and operational mindset.\r\n. Experience supporting shared platforms used by many teams.\r\n. Ability to document solutions clearly and enable team adoption.\r\n. Strong communication skills and comfort working with cross-functional stakeholders." ]
search terms: Infrastructure+Engineer
Expired
pin
pin
Local Job Bulletin is an independent Job Search Engine. Local Job Bulletin is not endorsed, sponsored or affiliated with the actual employer of the job. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder.
Upload your Resume - Let Employers find you!
pin
pin
 
 
Local Job Bulletin is an independent Job Search Engine. Local Job Bulletin is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Local Job Bulletin uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, job descriptions and other company descriptions / details are the property of their respective holder. Local Job Bulletin does not have its users apply for a job on the LocalJobBulletin.com website. Additionally, Local Job Bulletin may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.;
pin
pin