- Contract period: from start date to June 30 2024
- Location: ACT SA VIC Offsite
- Security: Must have Negative Vetting Level 1
About the Role:
SoftLabs is seeking Systems Administration Services for ICT Labour hire at their technology consulting based in ACT SA VIC Offsite.
Requirements
Working with our Research Data Technology team the purpose of this engagement is to upgrade existing Research Data Management platforms and ensure their ongoing security posture is maintained. The work undertaken will complement ongoing software development activities and ensure we meet ISO27001 ISM and DSPF standards.
Scope includes but is not limited to:
- Upgrade Linux Operating Systems across application platforms
- Redeploy containerised applications and troubleshoot as needed
- Implement security hardening of applications operating systems and networking
- Review privileged access across all systems and code repositories
- Review Cybersecurity assessments
- Follow Change Management and Cybersecurity processes
Essential Criteria:
- Experience deploying Linux servers via Virtual Environments
- Extensive Linux administration skills
- Experience with Linux server hardening and firewall configuration
- Experience with containerised application environments such as Docker
- Experience in deploying environments via CI/CD tools
Desirable Criteria
- Advanced Web Application configuration experience
- Familiarisation with project and repository permissions on code repositories
- Familiarisation or experience with DevOps tools and processes
Desirable Criteria
- Advanced Web Application configuration experience
- Familiarisation with project and repository permissions on code repositories
- Familiarisation or experience with DevOps tools and processes
Application Deadline: Wednesday 17 April 2024
Expected Start Date: Monday 22 April 202
Job Type: Contract
Rate: As per Australian Market Standards
If you are interested in this position please click Apply with your resume in WORD and send your details for review. If you wish to have a confidential discussion call us onorfor more information
Upgrade Linux Operating Systems across application platforms Redeploy containerised applications and troubleshoot as needed Implement security hardening of applications, operating systems and networking Review privileged access across all systems and code repositories Review Cybersecurity assessments Follow Change Management and Cybersecurity processes