DirectClient:Texas Department of Public Safety(DPS)
Solicitation Number: 26R0015472b
Title: RHEL Linux System Administrator
Location: 5805 N. Lamar Blvd., Austin, TX 78752
Duration: Until 12/31/2026 with possible extension
Last date for submission: April 1, 2026 (2.00 PM-CST)
Important Note: The working position is Hybrid - On Site and Telework.
Candidate Qualifications
8 years hands on upgrades of systems is needed for both windows and RHEL. 98% of our systems will be VM upgrades
System Hardening & STIG Compliance:
o STIG-based Hardening: Experience in implementing STIG (Security Technical Implementation Guide) recommendations to harden both RHEL (5/6/7/8/9) and Windows Server systems, ensuring systems are configured to meet Department of Defense (DoD) security standards and best practices.
o RHEL STIG Compliance: Proficient in applying RHEL-specific STIG guidelines to harden Linux systems, including configuring SELinux, firewall rules, user permissions, and audit logs.
o Windows STIG Compliance: Hands-on experience ensuring Windows Server systems (2012/2016/2019/2022) adhere to Windows STIGs, including configuring Group Policy settings, Windows Defender, and local security policies to secure the OS.
o Audit and Security Log Management: Ability to configure auditd for RHEL and Event Log for Windows to ensure that security events are logged and monitored in compliance with STIGs.
o Mitigating Common Vulnerabilities: Address vulnerabilities related to CIS Benchmarks, STIGs, and other security frameworks, ensuring that systems are hardened against common threats and attacks.
o Automated Hardening and Remediation: Utilize automation tools such as Ansible, Puppet, or PowerShell scripts to ensure continuous compliance with STIGs across multiple systems.
STIG Remediation & Patch Management:
o Proficiency in running vulnerability scans (e.g., using Nessus, OpenVAS, or SCAP scanners) to check for compliance with STIGs and then applying necessary patches and configuration changes to remediate vulnerabilities.
o Implement continuous STIG compliance checks in production environments to ensure systems remain secure as patches and updates are applied.
Security Hardening Automation:
o Expertise in automating STIG compliance tasks using tools like OpenSCAP, Ansible, or custom scripts to ensure that both RHEL and Windows systems are consistently hardening to meet required security standards without manual intervention.