Expected Working Hours: Monday–Friday 9:00 am – 5:00 pm Central, full time, with flexible hours for occasional weekend change control, rotating on-call with two other team members
Reports To: Senior Manager Software Engineering
We are seeking a highly skilled (3–5+ years dedicated experience administering) IBM Workload Scheduler (IWS) Administrator to manage, maintain, and optimize our enterprise batch scheduling infrastructure. The successful candidate will be responsible for the end-to-end administration of the IWS environment hosted primarily on Red Hat Enterprise Linux (RHEL). This role requires a strong blend of IWS expertise, Linux system administration, and scripting to ensure high availability and seamless execution of critical business workloads.
Responsibilities
1. Administer Production IBM Workload Scheduler (aka Tivoli Workload Scheduler) environment with 28,000 unique daily jobs across ~350,000 daily job runs, 44 servers, and three other change control environments.
2. Administer, install, configure, and patch/upgrade IWS components (Master Domain Manager, Dynamic Agents, Dynamic Pool, Dynamic Workload Console).
3. Work with Product Owner on communicating work streams in Jira.
4. Manage job promotions using Workload Application Template-based processes, ensuring platform stability checks for each promotion.
5. Manage change control across four separate environments, enforcing standards and policies.
6. Maintain and promote 99.17% Production platform uptime per calendar month (excluding planned outages and maintenance windows) using SOPs, DevOps tools, and disciplined change control.
7. Communicate platform improvements to a user community of ~500 developers and data engineers.
8. Production consists of 44 servers across MDM, DWC, and dynamic agents.
9. Resolve complex job failures, performance bottlenecks, agent issues, and infrastructure issues.
10. Advise on complex job scheduling design questions for the scheduling support team.
11. Monitor scheduler health, manage database maintenance, perform backup/disaster recovery, and conduct monthly failovers.
12. Define and maintain security policies, user authorizations, and authentication for the DWC.
13. Respond to cybersecurity vulnerability assessments and regulatory audit inquiries (including PCI).
14. Design and implement Ansible automation and self-healing mechanisms to reduce unplanned outages.
15. Coordinate with offshore teams performing SOPs during non-working hours.
16. Script in Python using the IWS REST API.
Required Technical Skills
1. Strong experience with IBM Workload Scheduler architecture, especially Dynamic Workload Broker, V10.1+, high availability of MDMs managing Fault Tolerant Agent and Dynamic Agent architectures.
1. Strong conceptual understanding of Master Domain Manager (MDM), Backup MDM (BMDM), Dynamic Workload Console (DWC), Fault Tolerant Agent (FTA), Dynamic Agent (DA).
2. Strong grasp of conman CLI to monitor and control production plan, check job/job stream/resource status.
3. Strong grasp of composer CLI to define, modify and extract scheduling objects.
4. Strong grasp of planman CLI to control pre-production plan and GUI mirroring.
5. Strong grasp of lifecycle of daily production planning process, phases of JNextPlan/FINAL.
6. Proficiency in navigating the DWC web-based GUI to monitor workloads, manage user access security, and define scheduling objects.
7. Experience installing IWS components, applying Fix Packs, and Interim Fixes.
8. Troubleshooting with logs under TWSDATA/stdlist, adjusting trace level for netman, batchman, writer, mailman, etc.
2. Strong experience with IBM WebSphere Liberty.
1. Strong grasp of reading messages.log, traces.log, FFDC logs.
2. Strong grasp of configuring JVM heap sizes.
3. Strong grasp of configuring tracing scope, tracing levels, tracing retention, and trace strings.
3. Strong experience with Red Hat Enterprise Linux 8+.
1. Deep familiarity with bash/shell commands for text processing (grep, awk, sed), file manipulation, and system navigation.
2. Ability to manage, start, stop, and troubleshoot SystemD services using systemctl and journalctl for IWS agents and MDM.
3. Managing user accounts, groups, service accounts and deep knowledge of Linux file permissions (chmod, chown, ACL on local filesystems and NFS).
4. Ability to monitor system performance using top, htop, vmstat, iostat, sar to troubleshoot bottlenecks and platform unresponsiveness.
5. Understanding of Logical Volume Manager (LVM) and filesystem usage.
6. Checking TCP port availability, firewall rules (firewalld/iptables), and connectivity between MDM and Dynamic Agents using netstat, ss, ping, curl, etc.
7. Managing SSL/TLS certificates, private keystores, public truststores, and working with Certificate Authority.
4. Strong experience with scripting (Bash Shell, Python, etc.) for automation.
5. Understanding of networking principles.
6. Understanding of basic Oracle database administration, enough to troubleshoot with DBAs to prove when an issue is in Oracle.
1. Understanding of basic SQL to query job metadata.
2.1. Understanding of checking database connectivity.
7. Understanding of AWS cloud infrastructure.
8. Experience with using secrets manager (CyberArk PPM, Hashicorp Vault, or similar).