Information Technology
Cloud Automation Engineer II
Last updated
Cloud Automation Engineer II is a mid-to-senior level role for practitioners who independently own significant automation workstreams, design IaC frameworks rather than just implementing them, and actively shape the direction of a cloud automation or platform engineering function. At this level, engineers are expected to set technical standards, mentor junior engineers, and drive improvements to platform capabilities beyond their individual task queue.
Role at a glance
- Typical education
- Bachelor's degree in CS, software engineering, or information systems
- Typical experience
- 5-8 years
- Key certifications
- None typically required
- Top employer types
- Cloud-native organizations, large-scale enterprises, consulting and advisory firms, technology companies
- Growth outlook
- Strong demand driven by the maturation of platform engineering as an organizational discipline
- AI impact (through 2030)
- Augmentation — AI tools will likely automate routine IaC scripting and policy writing, shifting the role's focus toward higher-level system design, complex testing strategies, and managing the developer experience.
Duties and responsibilities
- Design and own the architecture of IaC module libraries, including interface design, versioning strategy, testing standards, and deprecation lifecycle
- Build and maintain advanced CI/CD pipeline patterns for infrastructure: multi-stage approval workflows, environment promotion gates, and rollback capabilities
- Implement GitOps patterns for fleet management: reconciliation loops, drift detection, and automated remediation for out-of-compliance resources
- Lead the design of multi-account, multi-region automation patterns that maintain consistency across a large cloud environment
- Develop and maintain policy-as-code frameworks that enforce security and governance standards across all IaC deployments
- Architect cloud cost automation: tagging enforcement, idle resource detection, commitment purchase optimization, and automated rightsizing recommendations
- Define testing standards for infrastructure code: unit test conventions, integration test strategies, and CI performance optimization
- Mentor Cloud Automation Engineer I team members through code review, pairing, and structured technical guidance
- Evaluate new automation tools and platforms, produce architectural assessments, and recommend adoption or rejection with supporting rationale
- Drive cross-team automation improvements: standardization projects, platform migrations, and developer experience enhancements that affect multiple teams
Overview
Cloud Automation Engineer II practitioners own the design and direction of automation systems, not just their implementation. The distinction matters because automation systems, like software systems generally, are easy to build quickly and expensive to maintain if built carelessly. An Engineer II thinks about module interfaces that will still make sense when 50 teams are using them and they haven't been touched in a year. They think about testing strategies that catch the class of errors that break things in production without making tests so slow that engineers skip them. They think about the developer experience of the platform — not just whether it works, but whether teams actually want to use it.
The IaC module library is often the most important product an Engineer II owns. Well-designed modules encode organizational standards in a way that makes compliance the path of least resistance: the default configuration is secure and cost-appropriate, the interface exposes the options teams legitimately need, and the documentation is clear enough that consumers can use it without a support ticket. Poorly designed modules create a proliferation of workarounds, manual exceptions, and security gaps that erode the value of the entire automation investment.
Policy-as-code frameworks require similar design discipline. A policy library needs to cover real risks, avoid false positives that interrupt legitimate work, and be maintainable as the cloud environment evolves. Writing one policy is straightforward; maintaining 100 policies across changing cloud service APIs, evolving security standards, and multiple platform versions is a software maintenance problem that requires engineering rigor.
The cross-team influence dimension distinguishes this level from Engineer I. Engineer IIs contribute to platform decisions that affect multiple teams, evaluate tools across the organization's automation needs rather than a single team's needs, and build the relationships with development teams and security teams that make the platform genuinely useful rather than a compliance checkbox.
Mentoring at this level is substantive. Code review isn't just catching errors — it's explaining why a module interface should be designed one way versus another, how to think about testing trade-offs, and what makes a Terraform plan readable to someone who didn't write it. That coaching has leverage: every engineer whose skills improve is an ongoing benefit to the platform.
Qualifications
Education:
- Bachelor's degree in computer science, software engineering, or information systems
- Strong portfolios of production IaC work and relevant certifications are accepted alongside formal education
Experience:
- 5–8 years in cloud engineering, DevOps, or infrastructure automation roles
- 3+ years of production Terraform ownership — not just contributing to others' modules but owning module design and maintenance
- Evidence of cross-team influence: standards that other teams adopted, platform work that benefited multiple teams
IaC depth:
- Terraform: advanced module design, provider development basics, state migration strategies, workspace and environment patterns, Terratest for integration testing
- Terraform Cloud or Enterprise: RBAC, policy sets, run triggers, team workflows
- GitOps: Atlantis or equivalent for PR-based infrastructure workflows, drift detection and automated reconciliation
- Secondary familiarity with AWS CDK, Pulumi, or Crossplane for organizations using these alternatives
Policy and security automation:
- Policy-as-code: OPA/Rego for custom policy development, Checkov, tflint
- Security automation: IAM audit scripts, credential rotation automation, CSPM integration
- Compliance: translating framework requirements (CIS, SOC 2, PCI) into implemented policy rules
Software engineering:
- Python at a software engineering level: well-tested, well-documented, maintainable code — not just scripting
- Testing: Terratest, pytest for infrastructure tests, mocking cloud APIs for unit tests
- Code review: structured feedback that improves code quality and engineers' skills simultaneously
Architecture and design:
- Module versioning and lifecycle management: semantic versioning, changelog maintenance, deprecation policy
- Multi-account automation patterns: AWS Organizations scale, cross-account role assumptions
- Developer experience design: thinking about module consumers, not just implementors
Career outlook
The Cloud Automation Engineer II level is where market demand concentrates for the platform engineering specialty. Organizations that have committed to internal developer platforms need engineers who can own the automation frameworks at production quality — not just implement tasks, but design systems that scale. The supply of engineers at this level is limited relative to demand, keeping compensation strong.
Platform engineering as an organizational discipline is maturing. Companies like Google (internal developer platform), Spotify (Backstage), and the CNCF's Platform Engineering Working Group have documented the value of investing in platform capabilities, and the industry is following. This creates structured organizational demand for Cloud Automation Engineer II skills that goes beyond individual team needs.
The Kubernetes ecosystem creates a growing specialization path. Helm chart development, Kubernetes operator development, and GitOps with ArgoCD or Flux are skills that complement cloud IaC automation and are in demand at cloud-native organizations. Engineers who develop both cloud IaC depth and Kubernetes automation expertise have access to a broader set of high-compensation roles.
FinOps automation is an emerging specialization within cloud automation. Organizations with large cloud spend are investing in automated cost governance — tagging enforcement, idle resource cleanup, commitment optimization — and need engineers who can build these systems reliably. Cloud Automation Engineer IIs who develop FinOps automation expertise are well-positioned for dedicated FinOps engineering roles that are appearing at large cloud consumers.
Career progression from this level leads to Senior Cloud Automation Engineer, Cloud Automation Architect, Platform Engineering Lead, or Staff/Principal Engineer. The architecture track requires stronger design skills and broader organizational scope; the management track moves toward Engineering Manager for platform teams. Both paths represent meaningful compensation growth. Independent consulting is also a strong option: Cloud Automation Engineer II-level practitioners are in high demand at consulting and advisory firms building platform engineering practices.
Sample cover letter
Dear Hiring Manager,
I'm applying for the Cloud Automation Engineer II position at [Company]. I've spent five years building and operating cloud automation infrastructure, the last two and a half as a mid-senior platform engineer at [Company] owning our Terraform module library and GitOps workflow.
The module library I've designed and maintained now covers 23 standardized infrastructure patterns used by 40 development teams. When I took ownership of it 18 months ago, it was a collection of independently created modules with inconsistent interfaces and no testing. I rebuilt the interface design from scratch — establishing a standard variable naming convention, standardizing output structures, and adding mandatory variables for the security controls our policy framework requires. I also built a Terratest suite that runs integration tests for each module against a dedicated test account; the tests provision real resources, validate their configuration against compliance requirements, and tear them down. The CI pipeline runs these tests on every PR before the module can be merged.
On the GitOps side, I built our Atlantis integration that manages all infrastructure PRs through a review-and-apply workflow. Every Terraform change goes through a PR, gets a plan run automatically, requires approval from the platform team, and then gets applied with a full audit trail. We've gone from infrastructure changes that were sometimes undocumented console operations to a complete history of every resource change with the PR discussion that led to it.
I mentor two Engineer I team members — I review their PRs with detailed explanations of why I'm suggesting changes, not just what to change, and we pair on complex module design problems.
I'm looking for a role with more multi-cloud scope and exposure to a larger-scale developer community. I'd welcome the chance to discuss what you're building.
[Your Name]
Frequently asked questions
- What specifically makes Cloud Automation Engineer II different from Engineer I?
- Independence and design ownership. Engineer I practitioners implement defined automation tasks and contribute to existing frameworks. Engineer II practitioners design the frameworks — they define module interfaces, establish testing standards, make technology selection decisions, and set direction for how the automation function operates. They also carry explicit mentoring responsibility for more junior engineers and contribute to cross-team platform decisions rather than only team-internal work.
- What does GitOps mean in the context of cloud infrastructure?
- GitOps applies Git as the single source of truth for infrastructure state. Infrastructure changes are made through pull requests to a Git repository; an automation system continuously reconciles the actual cloud state against what the repository specifies. Atlantis, Terraform Cloud, Flux, and ArgoCD are common tools for infrastructure GitOps. The benefit is a complete audit trail of all infrastructure changes, peer review of every change, and automatic remediation of drift — the actual state is brought back into conformance with the desired state without human intervention.
- What does module library versioning require in practice?
- Module versioning requires semantic versioning (MAJOR.MINOR.PATCH), a published changelog, backward compatibility commitments for MINOR and PATCH versions, and a deprecation policy for MAJOR versions. In practice, this means maintaining multiple major versions simultaneously while teams migrate to the new interface, communicating breaking changes with sufficient notice, and testing that existing consumers aren't broken by updates. This is significantly more work than writing the modules themselves and requires treating the module library like an API product.
- How does a Cloud Automation Engineer II handle a situation where the platform creates friction for development teams?
- At the II level, engineers are expected to engage with this problem directly rather than treating it as someone else's concern. That means collecting concrete feedback from development teams about where the platform creates friction, distinguishing friction that represents legitimate security trade-offs (and needs better explanation) from friction that represents platform design problems (and needs fixing), and driving the improvements with enough urgency that developer experience actually improves. Platforms that developers avoid defeat the purpose of building them.
- What is the role of AI in cloud automation engineering at this level?
- At the II level, engineers are expected to evaluate AI tools for automation use cases and make adoption recommendations. AI coding assistants have genuine utility for Terraform module development and Python scripting. AI-powered anomaly detection for cost and security automation is maturing. The question a senior engineer needs to answer is which tools provide enough reliable value to integrate into production workflows versus which produce results that require too much human oversight to be net positive. Making this judgment well is a differentiating skill at this level.
More in Information Technology
See all Information Technology jobs →- Cloud Automation Engineer$105K–$150K
Cloud Automation Engineers build the scripts, pipelines, and IaC configurations that make cloud infrastructure provisioning and operations repeatable and less dependent on manual intervention. They sit between cloud administration and platform engineering — writing Terraform and Python that automates what used to require someone logging into a console, and building CI/CD workflows that make cloud infrastructure changes as disciplined as application code changes.
- Cloud Automation Specialist$100K–$145K
Cloud Automation Specialists identify and eliminate manual, repetitive cloud operations work by building scripts, pipelines, and automated workflows that run reliably without human intervention. They combine cloud platform knowledge with scripting and IaC skills to automate provisioning, compliance checking, cost management, and operational responses — reducing toil and improving consistency across the cloud environment.
- Cloud Automation Architect$145K–$195K
Cloud Automation Architects design the systems that make cloud infrastructure provisioning, configuration, and operations repeatable, consistent, and scalable without human intervention at every step. They build the platform capabilities — IaC frameworks, CI/CD pipelines, self-service portals, policy-as-code — that allow engineering teams to provision and operate cloud resources quickly while staying within security and governance guardrails.
- Cloud Backup Administrator$75K–$110K
Cloud Backup Administrators design, implement, and maintain data protection systems that ensure critical organizational data can be recovered when systems fail, data is corrupted, or cyberattacks force restoration from clean backups. They configure backup schedules, validate recovery procedures, manage retention policies, and ensure that backup infrastructure meets the organization's recovery time and recovery point objectives.
- DevOps Manager$140K–$195K
DevOps Managers lead the teams that build and operate CI/CD pipelines, cloud infrastructure, and developer platforms. They hire and develop engineers, set technical direction for the platform, manage relationships with engineering leadership and product teams, and ensure that delivery infrastructure enables rather than constrains the broader engineering organization.
- IT Consultant II$85K–$130K
An IT Consultant II is a mid-level technology advisor who designs, implements, and optimizes IT solutions for client organizations — translating business requirements into technical architectures and guiding projects from scoping through delivery. They operate with less oversight than a Consultant I, own client relationships on defined workstreams, and are expected to produce billable work product with measurable outcomes across infrastructure, software, or business-process domains.