Logo
Brooksource

System Administrator

Brooksource, Indianapolis, Indiana, United States, 46201


Job Title:

System AdminVulnerability Management AnalystLocation:

Indianapolis, IN (Hybrid: 3-days On-Site)Duration:

6-month Contract to HirePay:

$35-40/hr Depending on Experience

Job Overview:We are seeking a skilled System Administrator / Vulnerability Management Analyst with a strong background in vulnerability remediation, server OS patch management, and automation using scripting languages (e.g., Python, PowerShell, Bash). The ideal candidate will have IT experience focused on system administration and vulnerability remediation across both Windows and Linux environments. This role involves managing security patches, identifying root causes of system vulnerabilities, and driving automation for more efficient system administration and vulnerability management processes.

Key Responsibilities:Administer and maintain Windows Server 2016/2019/2022 and Red Hat Linux 7/8/9 systems, ensuring regular patching and upgrades to minimize vulnerabilities.Oversee the patch management process, ensuring all systems are compliant with security updates.Develop automated scripts using PowerShell, Bash, and Python to streamline patch deployment and system maintenance.Identify, prioritize, and remediate system vulnerabilities across both Windows and Linux environments.Conduct root cause analysis to determine the origin of security vulnerabilities and implement effective solutions.Collaborate with cross-functional teams to resolve vulnerabilities quickly and ensure that systems are secure and stable.Develop and maintain automation scripts to support system administration tasks, including vulnerability remediation, OS patching, and EOL/EOS software replacements.Leverage automation tools and custom scripts to reduce manual efforts and increase the efficiency of IT operations.Identify software that is approaching or has reached EOL/EOS and manage its remediation or replacement.Coordinate with application owners and IT teams to ensure that all unsupported software is either upgraded or decommissioned in line with security best practices.Monitor systems for security vulnerabilities and incidents related to unpatched systems or unsupported software.Assist in incident response efforts to remediate unpatched vulnerabilities and minimize security risks.Provide recommendations for improving system hardening and overall security posture.Maintain accurate documentation of system configurations, vulnerability remediation actions, and patch management processes.Generate detailed reports on patch compliance, system vulnerabilities, and the status of EOL/EOS software.Contribute to the development of policies and procedures that enhance system security and automation processes.

Qualifications:Bachelor’s degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., MCSA, RHCSA, CompTIA Security+) are a plus.At least 3 years of experience in Windows/Linux administration, patch management, and vulnerability remediation.Proven experience with scripting and automation (e.g., PowerShell, Bash, Python).Familiarity with vulnerability management tools (e.g., Nessus, Qualys, Rapid7) and remediation processes.Strong understanding of Windows and Linux operating systems, their patching mechanisms, and vulnerability management.Strong problem-solving and analytical skills with the ability to conduct thorough root cause analysis for system issues.Excellent communication skills, with the ability to collaborate effectively with technical and non-technical stakeholders.Ability to work independently and proactively in a fast-paced, security-focused environment.

Brooksource provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, national origin, age, sex, citizenship, disability, genetic information, gender, sexual orientation, gender identity, marital status, amnesty or status as a covered veteran in accordance with applicable federal, state, and local laws.