Responsibilities
- Provide 3rd Line support across Windows, Linux, cloud, and security services.
- Manage and optimize Windows Server, Active Directory, and SQL Server as the core enterprise platforms.
- Administer and maintain Linux environments (Red Hat, Satellite) alongside Windows services.
- Support and enhance cloud services (AWS, Azure, or similar) across compute, networking, storage, IAM, and automation.
- Implement and manage security/SaaS platforms including Tenable, CyberArk, Imperva/Akamai WAF, Okta, CrowdStrike, Proofpoint, Safe Breach, Zscaler, and Splunk.
- Deliver infrastructure projects including upgrades, migrations, and new deployments.
- Proactively monitor systems, identify vulnerabilities, and implement preventative measures.
- Support business continuity and disaster recovery initiatives.
- Provide input into solution designs, change control processes, and operational standards.
- Collaborate with stakeholders to define requirements and deliver operational improvements.
- Maintain documentation, including technical procedures and stakeholder reporting.
- Mentor and support junior colleagues, sharing knowledge and best practices.
- Be available, when required, for out‑of‑hours upgrades, maintenance, and incident response.
Core Skills & Experience
- Proven track record in senior infrastructure or systems engineering.
- Strong experience with Windows Server, Active Directory, and SQL Server.
- Good hands‑on experience with Linux (Red Hat, Satellite).
- Good knowledge of cloud platforms (AWS, Azure, or similar).
- Good level of understanding and administration in security/SaaS solutions: Tenable, CyberArk, Imperva/Akamai WAF, Okta, CrowdStrike, Proofpoint, Safe Breach, Zscaler, Splunk.
- Strong knowledge of Fortinet security technologies (Firewalls, FortiManager, FortiAnalyzer).
- Strong understanding of networking fundamentals (TCP/IP, VLANs, routing, firewalls).
- Hands‑on experience with infrastructure monitoring platforms, particularly WhatsUp Gold.
- Scripting and automation skills (PowerShell, Bash, Python).
- Proven ability to troubleshoot and resolve complex issues in hybrid environments.
- Familiarity with VMware, Cisco, and Dell Servers.
- Experience working in regulated or change‑controlled environments.
- Knowledge of high availability and disaster recovery solutions.
- Exposure to DevOps, CI/CD, and automation frameworks.
- Experience with Kubernetes and containerised environments.
Personal Attributes
- Passionate about technology, problem‑solving, and innovation.
- Analytical thinker with excellent troubleshooting skills.
- Strong communication skills, able to work with technical and non‑technical audiences.
- Highly motivated, detail‑oriented, and able to deliver under pressure.
- Team‑oriented, collaborative, and capable of mentoring colleagues.
Do
Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access.
- Planning for disaster recovery in the event of any security breaches.
- Monitoring for attacks, intrusions and unusual, unauthorized or illegal activity.
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems.
- Conduct security assessments, risk analysis and root cause analysis of security incidents.
- Handling incidents escalated by the L1 team in 24/7 rotational shifts.
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities.
- Completing all tactical security operations tasks associated with this engagement.
- Analysis of all attacks and coming up with remedial attack analysis.
- Conduct detailed analysis of incidents and create reports and dashboards.
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations.
- Maintain an information security risk register and assist with internal and external audits relating to information security.
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails.
Performance Parameter
- Customer centricity – timely security breach solutioning to end users, internal stakeholders and external customers experience.
- Process Adherence – adherence to SLA’s (90‑95 %), response time and resolution time TAT.
Mandatory Skills: Infrastructure Security Consulting.
#J-18808-Ljbffr
Contact Detail:
Test Triangle Ltd Recruiting Team