Linux Engineer / Administrator

Worthing
3 weeks ago
Create job alert

Linux Engineer / Administrator is requireby a well known company.

You will have the following skills / experience:

Overall purpose of the role
The IT Senior Linux Engineer is responsible for managing the high availability server infrastructure and associated operational services in line with the agreed Service Level Targets. Working with the other IT teams, such as Network Operations, Application Management, Security, Service Desk, Strategy & Architecture and the project delivery teams to ensure close alignment and engagement in implementing major developments and enhancements within the existing IT infrastructure.

Scope of role

  • Responsible for the resolution through 2nd & 3rd line support for all associated infrastructure issues;
  • Provides technical leadership for the resolution of service issues aligned to their technical capability;
  • Takes responsibility for the ownership of the service advancement of their technical capability;
  • Leads the engagement with the Strategy and Architecture team to understand technical direction and ensure strategic and operational alignment around support, maintenance & lifecycle management;
  • Assisting in the set up and maintenance of relevant IT policy and standards in line with appropriate best practice;
  • Keep up-to date with the latest relevant technology, relevant standards, policies and directives;
  • Liaise with internal governance and the relevant external authorities in order to ensure that we are moving towards an approved compliant infrastructure;
  • Produce and maintain operations manuals/run books for the associated services for this team in line with corporate standards;
  • Identifies and acts upon opportunities for continuous improvement to reduce operational risks, optimise efficiency and improve standards;
  • That product road maps and any associated remediation plans are in place to address operational risks.

    Major accountabilities of role
  1. To provide 2nd line support and 3rd line covering 24x7 on call rota
  2. Key contributor to SW Transition and Transformation Programmes of work.
  3. Defining and implementing IT quality assurance practices and procedures
  4. Ensuring that the appropriate IT technology standard requirements, methodology and processes are in place
  5. Attends and positively influences the appropriate technical and operational governance forums

    Experience and capability requirements
    Knowledge/experience:
  • RHEL 5,6,7 & 8 experience
  • Understanding of LVM
  • SE Linux configuration
  • Redhat Satellite, patch management
  • Ansible automation
  • Solaris 9 & 10 experience or relevant Unix knowledge
  • Solaris LDOM
  • Veritas Volume management
  • GIT or SVN version control
  • Cloud Platform experience - MS Azure or equivalent AWS
  • Troubleshooting, Diagnostics & Event Log/Management
  • Solarwinds configuration and management
  • Virtualisation, VMWare vSphere, ESX and ESXi
  • End point protection, DLP and GDPR (Symantec preferred)
  • Scripting: Bash, Perl or Python
  • Network fundamentals (Firewall, DNS, DHCP etc. from a client perspective) (preferred) Capability:
  • Experience of working in a Transitional multi supplier environment within a large-scale organisation
  • Experience of contributing to technical solution design and development leveraging existing tool suites and propose best of breed solutions.
  • Experience in ensuring that infrastructure conforms to architectural principles (e.g. supportability, future-proofing, consolidation, standards and strategy.
  • Demonstrable experience successfully challenging vendors on solution designs resulting in an improved product.
  • Stakeholder management with experience of working effectively with all levels throughout the organisation.
  • Excellent written and verbal communication skills, flexible and a proactive team player.
  • Technical expertise within a service and technical environment with a demanding, fast-paced environment

    This role is Inside IR35, please send your CV now for more details and immediate interview

Related Jobs

View all jobs

Platform engineer

Server Engineer

Penetration Tester

Product Owner - IAM

Technical Architect

IT Infrastructure Analyst

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.