Staff Production Engineer- Public Sector

Databricks Databricks · Data AI · VA · Engineering

This role focuses on owning and evolving the secure infrastructure, access patterns, and guardrails for Databricks' global platform, ensuring its operation in highly regulated, air-gapped, and sovereign environments. The engineer will design, automate, and operate IAM, account lifecycle, and cloud identity policies across AWS, Azure, and GCP, build reliable automation for cloud changes, own security and audit logging data pipelines, and operate specialized, highly regulated environments. The role also involves on-call duties and incident response for critical security and access infrastructure.

What you'd actually do

  1. Design, automate, and operate the IAM, account/subscription, and project lifecycle across AWS, Azure, and GCP, enforcing least-privilege and standardized access patterns at scale.
  2. Build and maintain reliable, observable automation and tooling to apply cloud changes (roles, policies, accounts, networking) safely and repeatedly.
  3. Own and improve security and audit logging data pipelines from cloud providers into our internal systems, ensuring timely, accurate data for detection, investigations, and audits.
  4. Operate and improve specialized, highly regulated environments (e.g., FedRAMp / GovCloud) including release management, patching cadences, and supporting secure access workflows (e.g., SAW).
  5. Participate in a 24x7 on-call rotation for high-severity incidents impacting cloud accounts, IAM, or security data pipelines.

Skills

Required

  • Eligible for TS/SCI security clearance
  • 8+ years of experience operating and automating large-scale cloud environments
  • Deep hands-on experience with at least one major cloud provider (AWS, Azure, or GCP) in areas such as IAM, networking, accounts/subscriptions/projects, and audit logging.
  • Strong background in Infrastructure-as-Code and automation (e.g., Terraform, CloudFormation, or similar) and CI/CD for infrastructure changes.
  • Proven experience working in or with security-sensitive or regulated environments (e.g., SOC2, FedRAMP, ISO 27001, financial services, public sector) and translating requirements into concrete technical controls.
  • Demonstrated success running high-availability, security-critical services, including on-call responsibilities and incident management.

Nice to have

  • Possession of a current polygraph (Counterintelligence or Full Scope)
  • Experience with Okta, Opal, or similar identity/access tooling.
  • Background operating secure admin workstations (SAW) or comparable hardened access patterns.
  • Experience migrating cloud accounts or subscriptions during M&A or large-scale reorganizations.

What the JD emphasized

  • eligible for a Top Secret / Sensitive Compartmented Information (TS/SCI) security clearance
  • highly regulated environments
  • security-sensitive or regulated environments
  • security-critical services