Hope you're doing great there..!
I am wondering if you have consultant available for the below position, if so please respond me with their most updated resume and the best contact number to reach them to discuss about the below role ASAP.
Please respond back to Asingh@tranzeal.com
NOTE : DIRECT CLIENT NEED..!!!!!!!
Job Title: Windows Server Administrator
Location: Denver, CO/REMOTE
Duration: 6+ months
Rate: $60/hr on C2C/1099
Duties:
2-4 years experience
Working within the IT Operations lane, the Systems Administrator role focuses on managing and administering systems at a server, Operating System, platform, or application level in the client enterprise environment. The Systems Administrator will directly contribute to the implementation, support, administration and management of servers, platforms, or applications throughout the enterprise. This particular hire will be a GTM position focused on assisting Admins with Windows Server patching and vulnerability remediation.
Skills:
Assisting the Windows Server team with managing, researching, and remediating vulnerabilities related to Windows Server Operating Systems. Familiarity with Windows Server 2003/2008/2012/2016/2019 required. Experience with security scan and vulnerability management platforms such as Tenable/Nessus required. Experience with Kenna vulnerability management platform preferred.
Assisting the Windows Server team with resolving issues related to Windows OS patching such as Servers not checking into patch automation platform. Working with application owners to schedule and deploy missing OS patches on Windows servers. Knowledge of Microsoft OS patching is required. Must have a fundamental understanding of Microsoft's cumulative rollup processes and past experience with deploying monthly OS patches. Experience with HP Server Automation or Data Center Automation preferred.
Participate in IT projects and programs both independently, and collaboratively with enterprise project teams. Will be required to participate in meetings with security and ISG teams related to vulnerability remediation efforts including but not limited to weekly ISG patching and vulnerability meetings and reviews of addressed vulnerabilities with ISG and security teams post monthly scheduled patching and maintenance windows.
Education:
Bachelor's degree or Associates degree preferred
Minimum of 2 years of comparable experience working in a large, international, matrixed organization
Required:
- Server hardware environments (HCI, Blade, HPE ProLiant, HPE Synergy, DL380, IBM P-850, P950)
- Enterprise experience with Operating Systems (Windows 2003\2008\2012\2016\2019)
- Enterprise experience deploying Windows Server OS updates through use of enterprise level patch management platform.
- Fundamental understanding of monthly Microsoft cumulative rollup process, WSUS, and Microsoft Update Catalog.
Platforms and Tooling (Active Directory, Virtualization (VMware VCenter), HP Server Automation/Micro Focus Data Center Automation or patch management platform, Tenable/Nessus or equivalent security scan applications, Kenna or equivalent vulnerability management platforms.)
Solid understanding of broader infrastructure components (TCP/IP, DNS, WINS, DHCP, SMTP, LDAP, NTP)
Solid understanding of and experience with the ITIL framework for enterprise change, incident, and problem management processes.
Experience with Enterprise scale system migrations, upgrades, required maintenance, and security best practices.
Preferred:
Experience with Tenable/Nessus Vulnerability Scanner, HP Server Automation/Data Center Automation, and Kenna Vulnerability Management platforms highly preferred.
Thanks & Regards
Avisheak Singh
You received this message because you are subscribed to the Google Groups "Xrecnet IT Recruiters Network - Corp to Corp IT Jobs & Hotlists" group.
To unsubscribe from this group and stop receiving emails from it, send an email to xrecnet+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/xrecnet/CAGMMjPOZJESQco%2B%3DkROxe0gmmEPgZcipcjqcGC5teXcZSfhzgw%40mail.gmail.com.
No comments:
Post a Comment