Search Jobvertise Jobs
Jobvertise

Breach Engineer System Administrator Part Time Contract
Location:
US-TX-Dallas
Email this job to a friend

Report this Job

Report this job





Incorrect company
Incorrect location
Job is expired
Job may be a scam
Other







Apply Online
or email this job to apply later

Location: In-Person or Remote

In a cybersecurity landscape where threats are constantly evolving, rebuilding and recovering after a breach is a critical task. modePUSH is seeking a Breach Engineer on a contract basis with an extensive background in a wide array of enterprise technologies, such as Active Directory, VMware, Hyper-V, SAN arrays, firewalls, SQL Server, systems, and more.

We're on the hunt for a real-life superhero, a 'Jack of all trades' and guess what? You also need to be the master of them! If you've got a cape made of multiple skills and a utility belt filled with excellence in every domain, we want you!


About the Role

Join us as our Breach Engineer, a key player in reconstructing companies' digital infrastructures after a breach. Your expertise across various enterprise technologies and your unwavering commitment to working 24-72 continuous hours at the onset of a breach are essential to this high-stakes role.

Our contractor positions aren't just flexiblethey redefine the 9-to-5, happily embracing weekend warriors and on-demand dynamos. Forward-thinking firms recognize the golden opportunity: when their IT aficionados are well-versed in the nuances of cybersecurity breaches, it's akin to having a knight guarding the company's digital treasure trove.

Join modePUSH as a Breach Engineer and embrace the rewarding challenge of rebuilding and recovering in the face of relentless digital threats. Apply now to become a vital force in our ongoing mission.

Requirements

What You Can Do for modePUSH

  • Engage in complex recovery efforts, leveraging your expertise in Active Directory, VMware, Hyper-V, SAN arrays, firewalls, SQL Server, Citrix, and other essential enterprise technologies
  • Respond with dedication and urgency to breach incidents, prepared to work 24-72 continuous hours to restore systems on engagement start
  • Collaborate with cross-functional teams, promoting innovation and refining recovery methodologies

What You Should Bring with You

  • Comprehensive knowledge and experience in a wide range of enterprise technologies.
  • Demonstrated ability to lead and execute complex technical projects in recovery scenarios
  • Commitment to working extended hours during breach incidents, fully grasping the critical nature of the role
  • Unwavering commitment to beating the bad guys
  • Prior experience in managing a variety of enterprise applications
  • A bachelor's degree is a nice bonus, but we're more interested in your skills and experience, so it's definitely not a deal-breaker

Additional notes

  • Siloed expertise is not as beneficial for this position.
  • We've noticed that those who have dabbled in as system administrators or have a past life at a Managed Service Provider (MSP) tend to be remarkably skilled for this role.
  • We're only hiring those authorized to work in the United States. We do not currently sponsor immigration visas
  • We're an Equal Opportunity Employer, striving to foster a diverse and inclusive work environment

Benefits

What modePUSH Can Do for You

  • Immerse yourself in the high-stakes world of data breaches, where you'll play a pivotal role in the recovery efforts, navigating complex challenges with precision and expertise.
  • Equip you with cutting-edge tools and technologies tailored to safeguard and rebuild critical systems
  • Encourage an innovative, collaborative environment that fosters professional growth and development
  • Provide opportunities for continuous learning and development in the field of cybersecurity

modePUSH, LLC.

Apply Online
or email this job to apply later


 
Search millions of jobs

Jobseekers
Employers
Company

Jobs by Title | Resumes by Title | Top Job Searches
Privacy | Terms of Use


* Free services are subject to limitations