Job Title
Infrastructure as Code (IaC) Engineer
Location
Grand Rapids, Michigan (Hybrid)
Schedule
Day Shift (8:00 AM – 5:00 PM)
Type
W2 Contract (Through December 2026, Extension Possible)
Pay Range
$67–$70/hour (W2 Only)
Summary
We are seeking an experienced Infrastructure as Code (IaC) Engineer to join a centralized cloud enablement team. This role focuses on building and maintaining standardized AWS infrastructure using Terraform, Spacelift, Rundeck, and GitHub.
You will play a key role in delivering scalable, secure, and automated cloud solutions while enabling self-service infrastructure across a multi-account AWS environment.
Key Responsibilities
- Build and maintain reusable Terraform modules and IaC patterns
- Deploy and manage infrastructure using Spacelift (stacks, approvals, drift detection)
- Develop Rundeck jobs for automation and operational workflows
- Create and maintain GitHub CI/CD pipelines using GitOps principles
- Define and enforce AWS standards (account structure, tagging, security, cost allocation)
- Implement secure automation using IAM roles and least-privilege access
- Partner with platform, security, and application teams to onboard workloads
- Create documentation, runbooks, and onboarding materials
- Troubleshoot infrastructure, pipeline, and automation issues
Required Qualifications
- Must have 5+ years of Terraform experience in AWS production environments
- Strong AWS expertise: IAM, VPC, EC2, S3, RDS, CloudWatch, KMS
- Experience with multi-account AWS environments and Organizations/SCPs
- Advanced Terraform skills: modules, remote state (S3/DynamoDB), versioning
- Hands-on experience with Spacelift (Terraform orchestration)
- Experience with Rundeck for automation
- Strong GitHub experience (Actions, PR workflows, branch protections, GitOps)
- Experience with secure cloud practices (IAM, secrets management, compliance)
- Strong troubleshooting and documentation skills
Preferred Qualifications
- Experience migrating teams to centralized IaC platforms
- FinOps experience (cost tagging, reporting)
- Policy-as-code exposure (OPA, Sentinel, etc.)
- Terraform tools (tflint, tfsec, checkov, infracost)
- Experience in regulated or compliance-driven environments
#INDPRO
#LI-JC1
