Job ID: TX-70126093 (99590501)
Remote Site Reliability Engineer/Admin (SRE/15+) with Windows/Linux, Java/.Net, Node.js, CVEs, ServiceNow/Tenable, audit/compliance, vulnerability scanning, Agile experience
Location: Austin, TX (TEA)
Duration: 3 Months
Skills:
8 Required Strong knowledge of:Windows and Linux servers,Application platforms (Java, .NET, Node.js)Databases and middle
8 Required Hands-on experience fixing application security vulnerabilities
8 Required Familiarity with CVEs, vendor advisories, and vulnerability scanning tools.
8 Required Agile
8 Required Strong documentation and stakeholder communication skills
Description:
We are seeking a Site Reliability Engineer (SRE) working in a Server Administrator capacity to support critical vulnerability analysis, remediation planning, coordination, and closure across enterprise systems within IT‑SEDS (Information Technology – Statewide Education Data System)The primary responsibility is to analyze security vulnerabilities, coordinate remediation across multiple technical teams, and ensure formal closure within enterprise vulnerability management systems, in alignment with the approved Statement of Work.
The position works across servers, operating systems, applications, databases, and middleware platforms, supporting Texas Education Agency (TEA) systems that serve over 1,200 Texas school districts.Work assignments follow established enterprise SDLC and change‑management processes, using an Agile‑like execution model for remediation planning, coordination, validation, and release support.
Key Responsibilities :
Analyze and classify Critical security vulnerabilities across servers, applications, databases, and middleware.
Review CVEs, scanner findings, and vendor advisories to validate applicability and risk.
Develop written remediation plans (patching, upgrades, configuration changes, library updates).
Coordinate remediation with:
Information SecurityServer Administrators,Application Development teams,DBAs, QA, and Release Management
Track remediation progress, risks, and dependencies.
Update status, evidence, and closure documentation in enterprise tools (e.g., ServiceNow, Tenable).
Support re‑scans, validation, audits, and compliance documentation.
Provide regular status reporting on open, in‑progress, and closed vulnerabilities.
