Canberra, ACT, Australia

Infrastructure Technician

 Job Description:

Australian Citizens With NV1 Clearance residing in Australia only respond 

  • Contract start ASAP to 6 months, 2 x 12 months extensions.
  • Australian Citizen, NV2 Clearance, Canberra role.

Send your responses to jobs@softtestpays.com

Required Skills and Experience:

Over 5 years experience in implementing large scale, geographically distributed systems on Wintel and Linux platforms.

Strong Windows administration and troubleshooting experience.

Strong cyber security focus in design, implementation and support; experience with and strong understanding of the following technologies/methodologies is essential:

VMWare VCF

Nutanix Enterprise Cloud

o Microsegmentation solutions, including VMWare NSX-T, Nutanix Flow, Illumio

o Backup and Data protection, including HYCU, VEEAM

Networking fundamentals

Experience in developing solutions for private cloud and/or multi-tenancy.

Experience in deploying, supporting and recovering virtual workloads.

Ability to take requirements, standards, and frameworks and apply them in a practical application to future proposed solution designs and systems.

Ability to adapt quickly to changing requirements in a fast-paced environment to meet changing deadlines and shifting priorities.

Experience in developing highly available/fault tolerant systems, networks, and infrastructure in a connected, partially connected, degraded, or often disconnected state.

Desirable Skills and Experience

Knowledge and skills in the design, implementation, and configuration of automation and orchestration technologies and services.

Knowledge and skills in DevSecOps technologies and principles, specifically infrastructure-as-code, Git, PowerShell, Python, or other similar languages.

Ability to rapidly build, automate, and deliver proof of concept systems to support analysis, testing, accreditation and development activities, preferably within a DevSecOps process.

Solid understanding of the concepts and fundamentals of one or more of the following technology/methodologies:

oPrivilege Access Management

oLeast Privilege Access

oNetwork Segmentation

oContainerisation

oFortinet Suite

oLinux (RHEL)

o Microsoft Enterprise products (AD, SQL, Exchange, Sharepoint)