Return-Path:X-Original-To: job-opps-relayxyz-outgoing Delivered-To: job-opps-relayxyz-outgoing@cs.swarthmore.edu Received: by allspice.cs.swarthmore.edu (Postfix, from userid 1442) id 9EB54F343; Mon, 14 Feb 2005 10:23:25 -0500 (EST) X-Original-To: job-opps Delivered-To: job-opps@cs.swarthmore.edu Date: Mon, 14 Feb 2005 10:23:25 -0500 To: job-opps@cs.swarthmore.edu Subject: [JOB OPP] Swarthmore ITS assistant sysadmin position Message-ID: <20050214152325.GA6122@allspice.cs.swarthmore.edu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i From: knerr@cs.swarthmore.edu (Jeff Knerr) Sender: owner-job-opps@cs.swarthmore.edu Precedence: bulk Reply-To: knerr@cs.swarthmore.edu (Jeff Knerr) ITS is looking for someone with good UNIX sysadmin knowledge to assist their full-time sysadmin. Some details are below. Contact Mark Dumic if interested. jeff -------------------------------------------------------------- >> I thought I would ask whether you knew of any current seniors with good unix >> expertise who might be interested in being a sysadmin for us for a year or so >> before moving on to bigger and better things. >> >> Whatever you could do to publicize this opportunity would be great. The other >> option we're looking at is getting a Drexel intern. Here's a brief description >> of the assistant sysadmin position. >> >> Mark >> >> Mark J. Dumic >> Associate Director Networking, Systems and Telecommunications >> Swarthmore College >> 500 College Avenue >> Swarthmore, PA 19081 >> (610) 328-8511 ** Basic Functions and Responsibility Acts as technical resource and assistant system administrator under the direction of the unix system administrator. Maintains the operation of central unix system hardware and software paying particular attention to the reliability, availability and security of these systems. Maintains server-based network services, including mail, web and domain-name services as well as providing backup support in maintaining the campus network. Position works collaboratively with others on the ITS staff and occasionally with other college departments and student groups. __________________________________________________________ ** Assists in the Maintenance of Central Unix Systems Hardware & Software Install, configure and maintain hardware on Red Hat linux servers and associated disk and tape drives. Configure and maintain storage systems, RAID levels and EMC SAN devices. Maintain Red Hat linux system software and utilities. Write and modify perl scripts as needed. Enhance security via host-based firewalls and tcp wrappers on applications. Arrange for technical support and hardware repair assistance from system vendors as needed. Maintain Apache web servers on central systems as well as accounts and privileges for web content providers. Maintain cgi and other dynamic links from web pages to databases and related applications. Assist in the creation of ITS web pages. Maintain a robust e-mail service for the College. Major components include smtp, procmail, AMAVIS, SpamAssassin, Dovecot imap, qpopper, Twig, IMP and MailMan. Read postmaster account. Maintains network services under unix including DNS and DHCPD. Maintain unix and network syslog files. Assist with the installation and operation of network management software including mrtg, cacti, and Nagios. ** Provides Network and Systems Security Services Installs and configures host-based firewalls, intrusion detection and change monitoring software including iptables, tcp wrappers and Tripwire. Becomes proficient in the use of nmap, Nessus and Snort/Acid for the detection and analysis of network and server security problems. Maintains scanning scripts using these tools that integrate with Bradford Software Campus Manager to provide for registration and enforcement of security policies on desktop computers. Implements open source netflow collectors and management/reporting servers. Provides instruction and consultation to College departments, faculty and students on how to secure their systems. Responds appropriately to intrusion attempts, network violations and incidents where systems are compromised. Works with departments and individuals to determine the extent of the damage and what system vulnerability was exploited to gain access. Assists departments and individuals restore their systems to pre-attack state and to close security holes. ________________________________________________________________________