Sr Production Engineer- Public Sector

Databricks Databricks · Data AI · VA · Engineering - Pipeline

This role focuses on owning and evolving the secure infrastructure, access patterns, and guardrails for Databricks' global platform, ensuring reliability and security in highly regulated, air-gapped, and sovereign environments. Responsibilities include automating IAM, access policies, and security logging pipelines, operating specialized environments like FedRAMP/GovCloud, and participating in incident response.

What you'd actually do

  1. Design, automate, and operate the IAM, account/subscription, and project lifecycle across AWS, Azure, and GCP, enforcing least-privilege and standardized access patterns at scale.
  2. Build and maintain reliable, observable automation and tooling to apply cloud changes (roles, policies, accounts, networking) safely and repeatedly.
  3. Own and improve security and audit logging data pipelines from cloud providers into our internal systems, ensuring timely, accurate data for detection, investigations, and audits.
  4. Operate and improve specialized, highly regulated environments (e.g., FedRAMP / GovCloud) including release management, patching cadences, and supporting secure access workflows (e.g., SAW).
  5. Participate in a 24x7 on-call rotation for high-severity incidents impacting cloud accounts, IAM, or security data pipelines.

Skills

Required

  • Eligible for TS/SCI clearance
  • 5+ years of experience in production engineering, SRE, security engineering, or cloud infrastructure roles
  • Deep hands-on experience with at least one major cloud provider (AWS, Azure, or GCP) in areas such as IAM, networking, accounts/subscriptions/projects, and audit logging
  • Strong background in Infrastructure-as-Code and automation (e.g., Terraform, CloudFormation, or similar) and CI/CD for infrastructure changes
  • Proven experience working in or with security-sensitive or regulated environments (e.g., SOC2, FedRAMP, ISO 27001, financial services, public sector) and translating requirements into concrete technical controls
  • Familiarity with access review processes, policy baselines, and audit evidence for cloud environments
  • Demonstrated success running high-availability, security-critical services, including on-call responsibilities and incident management
  • Strong debugging and problem-solving skills across distributed systems

Nice to have

  • Experience with Okta, Opal, or similar identity/access tooling
  • Background operating secure admin workstations (SAW) or comparable hardened access patterns
  • Experience migrating cloud accounts or subscriptions during M&A or large-scale reorganizations

What the JD emphasized

  • eligible for a Top Secret / Sensitive Compartmented Information (TS/SCI) security clearance
  • security-sensitive or regulated environments
  • FedRAMP
  • GovCloud
  • IAM
  • audit logging
  • access review processes
  • policy baselines
  • audit evidence