Negotiable
Outside
Remote
USA
Summary: The Salt Stack Infrastructure Automation Engineer role involves rewriting a legacy COBOL mainframe application in Rust while implementing secure infrastructure automation using Salt for AWS and Kubernetes. The position requires expertise in DevOps practices, CI/CD pipelines, and security compliance. The engineer will be responsible for maintaining infrastructure-as-code and delivering secure, repeatable environments. This is a remote position within the US, offering a contract duration of over 10 months.
Key Responsibilities:
- Author/maintain Salt states, formulas, pillars, and Jinja templates for app, data, and platform layers.
- Build GitOps-style pipelines (GitLab) for infra changes, secrets handling, and environment promotion (Dev UAT Prod).
- Integrate with Kubernetes (e.g., salt-ssh or salt-kube), bootstrap nodes, and manage cluster add-ons.
- Implement security baselines: CIS hardening, TLS, IAM roles/policies, key rotation, logging/monitoring hooks.
- Support blue/green cutovers; create rollback/runbooks and SLO/SLA monitoring (logs, metrics, alerts).
- Document runbooks, topology diagrams, and operations guides in Antora/AsciiDoc.
Key Skills:
- 5+ years with SaltStack (states, pillars, orchestration, event/reactor), plus strong Jinja/YAML/TOML templating.
- AWS production experience (IAM, VPC, EKS, EC2, RDS/S3, Parameter Store/Secrets Manager).
- CI/CD for infra (GitLab CI or similar), artifact/version management, and change control.
- Kubernetes operations (manifests/Helm/Kustomize, ingress, service meshes a plus).
- Security/compliance mindset; experience implementing least-privilege and auditability.
Salary (Rate): undetermined
City: undetermined
Country: USA
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
Hello,
Hope you are doing well.
we have a Job opportunity with one of our Client, If Interested Please share your resume to
Salt Stack Infrastructure Automation Engineer (5+ years)
Remote Within US
10+ months Contract
Scope/Background:
- Rewrite the legacy COBOL mainframe EAP application in Rust; design with security-first patterns (authZ/authN, encryption).
- Stand up DevOps/CI-CD in GitLab; implement automated test suites across SDLC and support UAT.
- Deliver infrastructure automation with Salt (AWS/Kubernetes), including one-touch deployments and blue/green strategies; docs in Antora/AsciiDoc stored with code in GitLab
Project Overview: The project modernizes Clients' (Bs EAP by rewriting the COBOL mainframe application in Rust, while standing up a secure, automated delivery pipeline: GitLab hosts code, CI/CD, and versioned docs (AsciiDoc/Antora), and Salt drives auditable infrastructure and one-touch deployments across Dev, UAT, and Prod. Work starts with requirements workshops and business-rule indexing, proceeds through secure architecture/design, Rust development with automated test suites, and UAT, and culminates in production cutover with a stabilization (hypercare) window.
Role summary: Own infrastructure-as-code with Salt for AWS/Kubernetes; deliver secure, repeatable environments and blue/green release enablement.
Key responsibilities:
- Author/maintain Salt states, formulas, pillars, and Jinja templates for app, data, and platform layers.
- Build GitOps-style pipelines (GitLab) for infra changes, secrets handling, and environment promotion (Dev UAT Prod).
- Integrate with Kubernetes (e.g., salt-ssh or salt-kube), bootstrap nodes, and manage cluster add-ons.
- Implement security baselines: CIS hardening, TLS, IAM roles/policies, key rotation, logging/monitoring hooks.
- Support blue/green cutovers; create rollback/runbooks and SLO/SLA monitoring (logs, metrics, alerts).
- Document runbooks, topology diagrams, and operations guides in Antora/AsciiDoc.
Required qualifications:
- 5+ years with SaltStack (states, pillars, orchestration, event/reactor), plus strong Jinja/YAML/TOML templating.
- AWS production experience (IAM, VPC, EKS, EC2, RDS/S3, Parameter Store/Secrets Manager).
- CI/CD for infra (GitLab CI or similar), artifact/version management, and change control.
- Kubernetes operations (manifests/Helm/Kustomize, ingress, service meshes a plus).
- Security/compliance mindset; experience implementing least-privilege and auditability.
Nice to have:
- Experience extending Salt or writing custom modules; Python scripting for glue/ops.
- Observability stacks (CloudWatch/PrometheGrafana/ELK/OpenTelemetry).
- Environment provisioning lead time, change failure rate, deployment frequency, and recovery time after change.
Thanks & Regards