
Azure Platform Engineer
3B Staffing LLC, St Louis, MO, United States
Azure Platform Engineer (Azure DevOps + Databricks Admin) - onsite in St. Louis, MO (4 days onsite) 6 plus years of experience required
Location : ONSITE in St. Louis, MO (4 days onsite) - send locals
Duration : 6mo
Visas: Since its W2 then USC or GC / GC EAD
Need for submittal
- resume, MMDD/Last 4 and if they have a linked in. Also send some sort of proof of location (like a DL or a bill or something)
Be sure the resume has the required skills (they listed must haves below) but they want 6 years of experience and make sure these skills are on resume (so check before sending)
Azure DevOps, Databricks, CI/CD, GItHub, Azure Active Directory (ADF) and Azure Data Lake, RBAC / IAM in Azure, Dynatrace, Scripting (Python, Shell or Bash), Databricks Unity Catalog Governance, Azure Key Vaults
We have a role for a Platform Engineer (Azure DevOps + Databricks Admin) - onsite in St. Louis, MO (4 days onsite)
St. Louis, MO (4 days onsite)
6+ years experience
JOB DESCRIPTION
Must-haves
Strong hands-on Azure DevOps/platform administration
Kubernetes, Terraform, Helm, Docker
CI/CD with Azure DevOps and/or GitHub Actions
Data platform experience: Databricks, ADF and/or Airflow, Azure Data Lake
RBAC/IAM in Azure + Active Directory (AD) group-based access
Azure Key Vault for secrets/keys/certs integration
Monitoring/incident triage with Dynatrace
Scripting: Python/PowerShell/Bash
Databricks Unity Catalog governance/permissions
Core responsibilities
Build, operate, and continuously improve a secure, reliable, automated cloud data platform on Azure + Databricks. Focus areas: IaC + CI/CD, Kubernetes/container operations, IAM/RBAC governance, secrets management, and observability/incident response.
Automate infra/app delivery (Terraform + CI/CD); standardize dev/test/prod releases
Operate/troubleshoot Kubernetes workloads; enforce limits/quotas/scaling and secure runtime practices
Administer Databricks (workspaces/cluster policies/access) and support pipeline orchestration
Implement least-privilege access + auditable entitlements (RBAC/IAM, AD groups) and secrets management (Key Vault)
Build actionable monitoring/alerts and drive RCA + preventive automation
Location : ONSITE in St. Louis, MO (4 days onsite) - send locals
Duration : 6mo
Visas: Since its W2 then USC or GC / GC EAD
Need for submittal
- resume, MMDD/Last 4 and if they have a linked in. Also send some sort of proof of location (like a DL or a bill or something)
Be sure the resume has the required skills (they listed must haves below) but they want 6 years of experience and make sure these skills are on resume (so check before sending)
Azure DevOps, Databricks, CI/CD, GItHub, Azure Active Directory (ADF) and Azure Data Lake, RBAC / IAM in Azure, Dynatrace, Scripting (Python, Shell or Bash), Databricks Unity Catalog Governance, Azure Key Vaults
We have a role for a Platform Engineer (Azure DevOps + Databricks Admin) - onsite in St. Louis, MO (4 days onsite)
St. Louis, MO (4 days onsite)
6+ years experience
JOB DESCRIPTION
Must-haves
Strong hands-on Azure DevOps/platform administration
Kubernetes, Terraform, Helm, Docker
CI/CD with Azure DevOps and/or GitHub Actions
Data platform experience: Databricks, ADF and/or Airflow, Azure Data Lake
RBAC/IAM in Azure + Active Directory (AD) group-based access
Azure Key Vault for secrets/keys/certs integration
Monitoring/incident triage with Dynatrace
Scripting: Python/PowerShell/Bash
Databricks Unity Catalog governance/permissions
Core responsibilities
Build, operate, and continuously improve a secure, reliable, automated cloud data platform on Azure + Databricks. Focus areas: IaC + CI/CD, Kubernetes/container operations, IAM/RBAC governance, secrets management, and observability/incident response.
Automate infra/app delivery (Terraform + CI/CD); standardize dev/test/prod releases
Operate/troubleshoot Kubernetes workloads; enforce limits/quotas/scaling and secure runtime practices
Administer Databricks (workspaces/cluster policies/access) and support pipeline orchestration
Implement least-privilege access + auditable entitlements (RBAC/IAM, AD groups) and secrets management (Key Vault)
Build actionable monitoring/alerts and drive RCA + preventive automation