EXPERIENCE AND EDUCATION:
Essential Qualifications/Experience:
Experience preparing project plans timelines and deliverables
Strong knowledge of Linux security audits vulnerability identification and mitigation
Handson experience with Ansible for security hardening and centralized configuration
Expertise in password policies bootloader protection and SSH key management 3072bit)
Experience in verification monitoring troubleshooting and cleanup after security changes
Ability to maintain documentation reflecting security and configuration updates
DUTIES/ROLE:
Prepare prerequisite documentations required for the project management for this engagement:
Present the overall project plan which summarizes the approach for each step for this engagement
Present a timeline with the targeted date for each activity
Present the templates of the deliverables
Review in details the audit report and its annexes which describe identified vulnerabilities with regards to Linux based systems
Perform an additional security assessment to identify any other potential and significant vulnerability not reported and which may affect the security and further suggest technical measures to mitigate vulnerabilities
For both the vulnerabilities still pending proper mitigation and newly discovered vulnerabilities define an action plan to mitigate these vulnerabilities and after review and validation implement the mitigation plan by leveraging the existing configuration management tool for Linux based systems (specifically Ansible). Sufficient testing of configuration hardening changes shall be performed by the Contractor before any implementation to production
Review password expiration
Review password protection for access to bootloader
Review Secure shell (SSH) key lengths not meeting the recommended 3072bit key length
Create or update existing Ansible configurations (e.g. playbooks etc. as deemed necessary and to ensure that configuration hardening is consistently enforced across the Linux IT systems and from a centralized system
Perform posthardening due diligence checks: System verification and monitoring potential troubleshooting potential configuration cleanup etc.
Update the existing technical documentations to reflect the potential configuration changes brought to the environment