Just finishing college ? we can help. Looking For A Change ? We got you covered.
Current Opportunities
Role : Atlassian Tools Administrator
Experience : 3+ Years
Responsibilities:
Manage JIRA, Confluence and BitBucket environments – includes creating and managing workflows, JIRA schemes, permissions, users/licensing, project/board creation, etc.
Ensure reliability, uptime and effective backup of software tools
Provide training to new users of JIRA, Confluence and other tools to leverage best practices
Manage software vendors, including procurement, licensing and support
Install, test and configure 3rd-party add-ons for our software tools
Assist with automated software build and test infrastructure
Perform other duties as assigned
Qualifications:
B.S. in Computer Science, Engineering, related field or equivalent work experience
Minimum 3 years of work experience as a DevOps Tools Administrator or Systems Administrator
2+ years experience administering Atlassian JIRA, Confluence and BitBucket
Experience training staff on use of software tools
Intermediate scripting skills in Python, Ruby or Linux shell scripts
Experience with Jenkins or other CI tools is a plus
Strong customer service orientation
Must be self-motivated in order to achieve assigned objectives with minimal supervision
Excellent written and verbal communication skills in English
Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.
Perform cyber defense trend analysis and reporting.
Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Coordinate with intelligence analysts to correlate threat assessment data.
Write and publish after action reviews.
Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
Qualifications:
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
Ability to apply techniques for responding to host and network-based intrusions using incident response technologies and techniques.