rockITdata

Experts in contact center solutions. Your product doesn’t differentiate you, but your customer support experience does.

AWS Cloud Administrator

Full TimeRemoteTeam 11-50H1B No SponsorCompany SiteLinkedIn

Location

United States

Posted

20 hours ago

Salary

Not specified

No structured requirement data.

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

The AWS Cloud Administrator is responsible for the operational health, security posture, and continuous availability of an AWS GovCloud (IL4) environment supporting the AI Contact Center platform. This role manages IAM policies, monitors infrastructure performance, enforces compliance baselines, coordinates patching and maintenance activities, and ensures 99.9%+ uptime across all AI services. The administrator works closely with the Security Engineer on FedRAMP High compliance, STIG hardening verification, and audit readiness, and supports the development team with environment provisioning and access management.

  • Manage and monitor an AWS GovCloud environment (us-gov-west-1) hosting Amazon Connect, Bedrock, Lambda, Lex, Kinesis, S3, CloudWatch, QuickSight, and Contact Lens
  • Administer IAM roles, policies, and permission boundaries following least-privilege principles for all team members and service accounts across Dev, Test, UAT, and Production environments
  • Monitor infrastructure health and performance using CloudWatch dashboards, alarms, and automated remediation runbooks; maintain ≥99.9% uptime SLA for AI services and ≥99.5% for production environments
  • Manage environment provisioning and configuration across the four-tier environment structure (Development, Test, UAT, Production), ensuring parity and change isolation
  • Coordinate scheduled maintenance windows and deployment activities with the CAB process via ServiceNow, ensuring zero-downtime deployments where possible
  • Implement and maintain CloudTrail logging, VPC Flow Logs, and CloudWatch Logs for all AI services; format and forward logs to the SIEM for security monitoring
  • Support the Security Engineer with FedRAMP High compliance activities: continuous monitoring, POA&M tracking, security control evidence collection, and audit artifact preparation
  • Manage S3 bucket policies, encryption configurations (SSE-S3, SSE-KMS), and lifecycle rules for call recordings, transcripts, and AI inference logs
  • Monitor AWS service quotas and request increases as call volumes scale; track Bedrock inference consumption, Lambda concurrency, and Kinesis shard utilization
  • Configure and maintain AWS backup strategies for critical data stores (DynamoDB, S3) with documented recovery procedures
  • Respond to operational incidents per the incident management framework; perform root cause analysis and implement preventive measures
  • Support 24x7x365 monitoring and on-call rotation for production environment availability
  • Maintain operational runbooks and standard operating procedures for common administrative tasks, incident response, and disaster recovery

Qualifications

  • 3+ years of experience administering AWS environments in production, including IAM, VPC, CloudWatch, CloudTrail, S3, Lambda, and KMS
  • Experience operating within AWS GovCloud or equivalent FedRAMP-authorized cloud environments
  • Strong understanding of IAM policy design, service control policies, permission boundaries, and cross-account access patterns
  • Proficiency with CloudWatch monitoring, alarms, dashboards, and log management (CloudWatch Logs, Log Insights)
  • Experience with infrastructure-as-code (CloudFormation, CDK, or Terraform) for environment provisioning and change management
  • Familiarity with NIST 800-53 security controls, FedRAMP continuous monitoring requirements, and DFARS 252.204-7012
  • Understanding of encryption at rest (KMS, SSE) and in transit (TLS 1.2/1.3) implementation in AWS
  • Experience with incident management processes and on-call rotations in production environments
  • Knowledge of serverless architecture administration (Lambda, API Gateway, Kinesis, S3 event triggers)
  • Strong documentation skills for runbooks, SOPs, and compliance evidence
  • Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent experience)

Preferred Qualifications

  • AWS certifications: SysOps Administrator, Solutions Architect, or Security Specialty
  • Experience with Amazon Connect administration and Contact Lens configuration
  • Prior work in IL4/IL5 or DoD environments with STIG compliance requirements
  • Familiarity with ServiceNow for change management and incident tracking
  • Experience with Azure GCC High environments and Azure-to-AWS interoperability
  • Knowledge of HIPAA technical safeguards and healthcare data handling requirements
  • Experience with AWS Organizations, Control Tower, or multi-account governance

Job Requirements

  • 3+ years of experience administering AWS environments in production, including IAM, VPC, CloudWatch, CloudTrail, S3, Lambda, and KMS
  • Experience operating within AWS GovCloud or equivalent FedRAMP-authorized cloud environments
  • Strong understanding of IAM policy design, service control policies, permission boundaries, and cross-account access patterns
  • Proficiency with CloudWatch monitoring, alarms, dashboards, and log management (CloudWatch Logs, Log Insights)
  • Experience with infrastructure-as-code (CloudFormation, CDK, or Terraform) for environment provisioning and change management
  • Familiarity with NIST 800-53 security controls, FedRAMP continuous monitoring requirements, and DFARS 252.204-7012
  • Understanding of encryption at rest (KMS, SSE) and in transit (TLS 1.2/1.3) implementation in AWS
  • Experience with incident management processes and on-call rotations in production environments
  • Knowledge of serverless architecture administration (Lambda, API Gateway, Kinesis, S3 event triggers)
  • Strong documentation skills for runbooks, SOPs, and compliance evidence
  • Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent experience)
  • Preferred Qualifications
  • AWS certifications: SysOps Administrator, Solutions Architect, or Security Specialty
  • Experience with Amazon Connect administration and Contact Lens configuration
  • Prior work in IL4/IL5 or DoD environments with STIG compliance requirements
  • Familiarity with ServiceNow for change management and incident tracking
  • Experience with Azure GCC High environments and Azure-to-AWS interoperability
  • Knowledge of HIPAA technical safeguards and healthcare data handling requirements
  • Experience with AWS Organizations, Control Tower, or multi-account governance

Related Categories

Related Job Pages