BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] [Position-available] Linux sysadmin position
- Subject: [Discuss] [Position-available] Linux sysadmin position
- From: shawn at ll.mit.edu (O'Shea, Shawn - 0665 - MITLL)
- Date: Mon, 6 Oct 2014 19:48:14 +0000
------------------------------------------------------- To post your own position-available or position-wanted message, please follow the procedure at: http://blu.wikispaces.com/job+posting+policy ------------------------------------------------------- -------------- next part -------------- My team is looking for a mid-senior career Linux admin. The job is in Lexington, MA. I've been commuting from Hudson, NH to here for 8 years. The work is supporting a research environment and requires U.S. citizenship and will require you to apply for a U.S. government SECRET clearance. Please contact me if you are interested. Here's the detailed job description: We are seeking a system administrator to build and maintain complex systems and networks in a research environment. The administrator will support highly technical end users by maintaining laboratories of research servers and networks, virtual environments, and desktop/laptop development systems. A successful candidate must have a desire to learn new skills and technologies, work well with a team, have strong communication and documentation skills, and seek creative solutions that further the overall goals of the organization. Responsibilities include: ? Hardware and software installation of servers and network equipment ? Application installation, configuration and integration ? Designing and developing solutions to solve researcher problems and meet their IT needs ? Document configurations, procedures, physical and logical system topologies, ? Automate and document repetitive tasks ? Interface with internal site-wide IT organization to facilitate organizational efforts in security, compliance and asset management ? Provide limited technical support to researchers ? Perform regular maintenance tasks such as anti-virus scans, system patching, and software upgrades ? Track tasks in an issue tracker to keep stakeholders appraised of task loading and status Required abilities: ? A BS in Computer Science or equivalent experience desired ? A minimum of 5 years experience performing regular system administration duties on server class Linux systems ? Strong Linux skills are critical ? Ability to automate using scripting languages (e.g. shell or Python) ? Experience with virtualization technologies (VMware vSphere preferred) ? Demonstrated understanding of fundamental networking concepts and technologies (such as switching, VLANs, routing, firewall rules/access lists). Hardware experience with Cisco and/or Extreme preferred ? Knowledge of common open source tools and services (web server, LDAP, DNS, DHCP, NFS, git) ? Work with Puppet configuration management and the tools in the Puppet ecosystem (Puppet, Foreman, MCollective, vagrant). Experience is a plus, but must at least have a desire to learn these technologies The position is currently for a full-time long-term contract, but open to the possibility of a direct hire now or in the future. Due to our hiring process for contractors, there are a number of agencies on contract that we can put you in touch with, and salary would be negotiable between you and the agency based on their bid against a government RFP. The position is at MIT Lincoln Laboratory in Lexington, MA, specifically in the Airborne Networks research group ( http://www.ll.mit.edu/employment/division6.html#65 ). For those interested in public transit, Lincoln is accessible via the 76 bus from Alewide or via private shuttle bus from MIT campus (see https://www.ll.mit.edu/about/shuttle.html ). If interested please forward resumes to me at shawn at ll.mit.edu -Shawn Shawn K. O'Shea 781-981-3401 IT Services Group 65 - Airborne Networks MIT Lincoln Laboratory
- Prev by Date: [Discuss] code for hacked USB drive (BadUSB) released on Github
- Next by Date: [Discuss] code for hacked USB drive (BadUSB) released on Github
- Previous by thread: [Discuss] code for hacked USB drive (BadUSB) released on Github
- Next by thread: [Discuss] ubuntu 14.04 apparmor aa-enforce Traceback
- Index(es):