10 Linux Server jobs in Oman
Linux System Engineer - QA, Tooling, Automation
Posted 9 days ago
Job Viewed
Job Description
Overview
Canonical is a leading provider of open source software and operating systems to the global enterprise and technology markets. Our platform, Ubuntu, is widely used in breakthrough enterprise initiatives such as public cloud, data science, AI, engineering innovation, and IoT. The company is a pioneer of global distributed collaboration, with 1200+ colleagues in 75+ countries and very few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy and execution. The company is founder-led, profitable, and growing. This is a globally remote role.
RoleWe are seeking a systems software engineer passionate about software quality, Ubuntu, and the open source community, to join the Ubuntu Release Engineering team as we expand the set of open source packages we fully support and secure. We see release engineering as a first class engineering practice and are looking for people who can bring deep engineering insights to automation, testing capabilities, reporting and data analytics, as well as run processes in partnership with Canonical and community teams. Ubuntu strives to deliver the latest-best free software components, in an easy to use and highly reliable form. We build on the technical excellence of Debian and bring additional focus and shape to the solutions we offer the industry. As an Ubuntu Release Engineer, you must be passionate about the future of Ubuntu, about quality and continuous integration and testing. You will work closely with multiple teams at the heart of Ubuntu and drive quality excellence. You will work closely with the Ubuntu Desktop, Server and Foundations team and put in place metrics for quality. You will research existing issues, troubleshoot and resolve problems, and identify opportunities for improvement and communicate them to the rest of the organization to drive the overall quality of Ubuntu. This is a great opportunity to start and progress your career in the QA domain.
Responsibilities- Monitor indicators of quality across the Ubuntu ecosystem and products
- Troubleshoot and resolve issues in Ubuntu Desktop, Ubuntu Server and Ubuntu Core
- Enhance our continuous integration to guard Ubuntu image, release and package quality
- Report on KPIs and analytical insights
- Empower other teams for better planning and constant quality improvements
- Develop, enhance and automate test cases, from unit tests to end-to-end multi-machine workloads
- Work from home with international travel twice a year, for events up to two weeks long
- A strong software engineering, Linux, and open source background
- In-depth knowledge of Python and Shell scripting
- Experience with C/C++
- Excellent troubleshooting skills and experience working with others to identify, isolate and resolve issues
- Experience with quality processes and continuous integration tools
- Experience working in an agile development environment
- Additional skills: Experience with Debian/Ubuntu-based operating systems and good understanding of Debian packaging and snaps is a plus
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues from your team and others
- Priority Pass for travel and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world daily. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence and aim to be the best at what we do. Canonical has been a remote-first company since its inception in 2004 and offers a window into the world of 21st-century digital business.
Canonical is an equal opportunity employer. We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
#J-18808-LjbffrSystem Administrator / System Engineer
Posted 13 days ago
Job Viewed
Job Description
Our company is looking for a System Administrator / System Engineer who will be responsible for the operation and development of the IT infrastructure, including servers, networks, workstations, and cloud services, system administration, security support, and participation in ISO 27001 audits.
This role offers the opportunity to grow in the areas of DevOps practices, AWS, information security, and process automation, while receiving company support and continuously improving your skills.
Our hiring process is competitive. This means we review several candidates in parallel, and the final decision is made only after all stages of the process are completed. An offer can be extended only upon successful completion of all stages.
- Google Workspace
- Active Directory, SSO, MFA solutions
- Networking (VPN, DNS, firewalls)
- Backup and recovery systems
- Endpoint protection and patch management tools
We are seeking a System Administrator / System Engineer who is eager to take ownership of our IT infrastructure, spanning servers, networks, endpoints, and cloud services. You will play a key role in administering user accounts, maintaining secure access controls, and ensuring the smooth operation of business-critical systems such as Google Workspace, Active Directory, and VPN services.
This role offers the opportunity to collaborate with security, compliance, and development teams, contributing to both daily operations and long-term improvements in our infrastructure.
CultureWe are committed to implementing high standards in the technology industry, and this is the core mission of our work. To achieve this mission, the company and all its members are constantly evolving.
Each of us has the opportunity to contribute to the product, the company, the team, the industry, and our personal development.
At Techstack, you have the option to choose from various growth opportunities that align with your interests:
- Meetups, where you can share your knowledge and develop simultaneously by sharing your experiences within the company and local technical communities.
- Participation in our technical Guilds, where you can discuss technical solutions, approaches, and industry trends.
All of these elements contribute to shaping the culture and expertise within both, our team and the company as a whole.
Your responsibilities- Manage and maintain the company's IT infrastructure (servers, networks, endpoints, cloud services).
- Administer user accounts, permissions, and access controls according to least-privilege principles.
- Implement and maintain security controls (encryption, backups, monitoring, patching).
- Maintain an up-to-date asset inventory and ensure proper classification and protection.
- Perform regular system updates, vulnerability assessments, and remediation.
- Respond to incidents and outages, document root causes, and support recovery efforts.
- Document infrastructure, processes, and standard operating procedures (SOPs).
- Collaborate with security, compliance, and development teams on Information Security Management System activities.
- Support internal and external ISO 27001 audits by providing evidence and reports.
Have 3+ years of experience as a System Administrator, System Engineer, or in a similar role.
Experienced in Google Workspace administration.
Have strong knowledge of Linux and Windows server administration.
Proficient in networking, firewalls, and VPN configuration.
Experienced in identity and access management (AD, SSO, MFA).
Understand concepts and practices of backup, restore, and disaster recovery solutions.
Strong documentation, reporting, and troubleshooting skills.
Have an Intermediate or higher level of English proficiency.
Able to attend the offices in Kyiv or Lviv.
It would be a plus if you have:Bachelor’s in Computer Science, Information Technology, or related.
Strong knowledge of macOS administration.
Hands-on experience with the AWS cloud platform.
Practical knowledge of ISO 27001 controls, risk management, and compliance processes; experience participating in ISO 27001 audits is a plus.
Proficient in DevOps practices and Infrastructure as Code.
Experience integrating AI-based solutions.
What we havefor youStable and long-term position in the company.
Broad opportunities for professional and career growth, including professional challenges that encourage personal development, meetups, hackathons, professional communities, and more.
Horizontal connections and absence of micromanagement, fostering a collaborative environment where all team members are accessible to each other for any concerns.
Hubs in Kharkiv, Kyiv, Lviv, and Wrocław (Poland) or everything necessary for remote work.
Up to 50% compensation for the cost of educational courses and conferences to support professional development.
Free English language and business English courses.
Legal and accounting support.
Appreciation gifts for significant events and occasions.
How to join TechstackPre-screening with Recruiter.
Review of your CV by experts.
Interview with our experts.
Final interview with company leadership.
About usTechstack is a technology product engineering company that sets an example for high development standards in the IT industry. We empower each team member to influence the development of the product, company, and processes.
#J-18808-LjbffrSenior System Administrator
Posted today
Job Viewed
Job Description
About the Role:
United Finance Company is seeking a Senior System Administrator to manage and support our IT infrastructure. The role involves server and network administration, IT security, virtualization, cloud management, and ensuring business continuity.
Key Responsibilities:
- Install, configure, and maintain servers and server software.
- Monitor server performance, uptime, and utilization.
- Manage routers, switches, firewalls, and network configurations.
- Troubleshoot and resolve server and network issues.
- Maintain and update LAN/WAN network diagrams.
- Implement and manage security policies, access controls, and malware protection.
- Support IT Security Officer on audits and mitigation.
- Manage backups, disaster recovery, and business continuity planning.
- Oversee software installation, updates, and license compliance.
- Manage VMware/Hyper-V virtualization and cloud platforms.
- Maintain IT infrastructure documentation and enforce policies.
- Use monitoring tools to set up alerts and track system health.
- Collaborate with IT Security Officer on first-level security incident responses.
Requirements:
- Bachelor's degree in Computer Science, Information Technology, or related field.
- 2–3 years of relevant experience as a System/Network Administrator.
- Bilingual (Arabic & English)
- Good knowledge of Oman's geography
- Hands-on experience with Windows/Linux servers, virtualization tools (VMware/Hyper-V), and cloud platforms (Azure/AWS).
- Strong knowledge of firewalls, routers, switches, and security controls.
- Familiarity with backup and recovery strategies.
- Strong troubleshooting and problem-solving skills.
- Excellent communication and teamwork.
Senior System Administrator
Posted today
Job Viewed
Job Description
- Information Technology Services
- Friday Oct 03, 2025
The Senior System Administrator is responsible for the installation, configuration, operation, security, and maintenance of the organization's systems, servers, storages and related infrastructure. The role ensures high levels of availability, performance, and security across enterprise IT environments, supporting both users and University objectives.
ResponsibilitiesSystem Administrator performs a wide range of duties as mentioned below:
Install, configure, monitor, and maintain Active Directory (AD), DNS, and DHCP environments for the enterprise.
Administer Active Directory domains, including replication, sites/services, and DNS functionality.
Manage Group Policies (GPOs) for system security, compliance, and optimization
Develop and maintain basic to intermediate PowerShell scripts for automation and administration tasks.
Manage, Monitor and Provide technical support for Microsoft Exchange, Office 365, and hybrid email environments, including configuration, testing, and client support.
Implement, configure, and maintain VMware virtual infrastructure, including vCenter and ESXi hosts.
Manage and Monitor Servers, Storages, system backups, replication, and recovery using Veeam Backup & Replication.
Install, configure, and maintain Windows and Linux servers to ensure availability and reliability.
Coordinate with vendors to implement and manage Annual Maintenance Contracts (AMCs).
10. Perform daily monitoring of the Disaster Recovery (DR) environment and ensure the successful execution of the annual DR test.
Monitor, review, and analyze system events and logs, taking corrective actions as required.
Plan and perform system upgrades and patch management to enhance functionality, performance, and security.
Coordinate and perform software and application installation, testing, and upgrades across systems.
Monitor systems daily and respond immediately to security, performance, or usability issues.
Provide technical support for both hardware and software issues for end users.
Respond to, resolve, and document helpdesk tickets and support requests in line with SLAs.
Assist in IT projects, including infrastructure upgrades, migrations, and expansion.
Apart from this any other duties and responsibilities related to your job / position can be added in the future by the line manager.
- Minimum 6 years' experience as a System Administrator.
- Strong background in Active Directory, Domain Controllers, Exchange servers and Office 365 administration.
Technical Skills:
- Advanced knowledge of Windows Server and Linux OS administration.
- Proficiency in VMware virtualization and Veeam backup/replication solutions.
- Experience in exchange servers and Office 365 administration and hybrid configurations.
- Familiarity with PowerShell scripting for automation.
- Strong troubleshooting and incident resolution capabilities.
- Knowledge of IT security best practices (patching, hardening, access control, etc.).
- Strong analytical, problem-solving, and decision-making skills.
- Ability to prioritize tasks and deliver results under pressure.
- Excellent communication skills in English (required) and Arabic (preferred).
- Team player with the ability to train and guide junior staff.
Commitment to continuous learning and professional development.
Qualification- Bachelor's degree in information technology, Computer Science, or a related field from an accredited institution.
Professional certifications (e.g., MCSE, MCSA, VMware VCP, Veeam, Office365) are preferred.
Job Overview- Job nature : Full Time
- Posted date : Thursday Sep 18, 2025
- Closing date : Friday Oct 03, 2025
Field Service Representative (System Administrator)
Posted 8 days ago
Job Viewed
Job Description
Location
Muscat, Oman
PositionField Service Representative (System Administrator)
OverviewITC Defense is looking to add a full-time Field Service Representative (Systems Administrator) in Oman for the CENTCOM Partner Network (CPN). The position will require operations support, maintenance, system administration, sustainment, and training for CPN, Agile Client, and associated networked sites. Relocation benefits provided if applicable.
Responsibilities- Provide support in technical specifications development, process analysis and design, technical problem solving, and analytical/logical thinking.
- Provide system administration, network administration, and IT services for CPN Oman.
- Provide detailed descriptions of technical issues, site visits/engagements, trouble ticket metrics, and risks related to Oman’s CPN-SAU systems, architecture, or network that arise in the performance of duties.
- Provide support to USG architecture planning for a CENTCOM Partner Network (CPN) technical refresh and expansion.
- Procurement, installation and configuration of CPN client hardware/software.
- Responsible for the installation and configuration of CPN related networks with associated communication security devices (COMSEC).
- Act as System manager/integrator in integration and implementation of IEEE 802.3 Local Area Network (LAN), IEEE Wide Area Network (WAN) and converged IP-services that leverage COTS information technologies to deliver enhanced mission capabilities.
- Provide specialized experience in enterprise and campus-wide WAN/LAN infrastructures in allied military (FMS) shore facilities worldwide, including Command & Control centers, Operations Centers, and logistics support centers.
- Share information through the Common Operational Picture service and Voice over IP.
- Support development and writing of program related documents.
- Other tasks as assigned.
- Security Clearance level “Secret” or above and be able to maintain required clearance
- U.S. Citizen
- Five (5) years with degree/formal training or seven (7) years with HS/GED of practical experience to include: design, preparation and modification of engineering documents and drawings.
- Individuals should have notable experience performing one or a combination of the following duties: constructing components, subunits, or simple models or adapting standard equipment; troubleshooting and correcting malfunctions; following specific layout and scientific diagrams to construct and package simple devices and subunits of equipment; conducting various tests or experiments which may require minor modifications in test setups or procedures as well as subjective judgments in measurement, selecting, preparing, and operating standard test equipment and records test data; extracting and compiling engineering data from field notes, manuals, lab reports, etc., processing data, identifying errors or inconsistencies, selecting methods of data presentation; assisting in design modification by compiling data related to design, specifications, and materials that are pertinent to specific items of equipment or component parts; developing information concerning previous operational failures and modifications, and using judgment and initiative to recognize inconsistencies or gaps in data and seek sources to clarify information.
- Individual shall be capable of performing assignments that are not completely standardized or prescribed, selects or adapts standard procedures or equipment, using fully applicable precedents, receives initial instructions, equipment requirements, and advice from supervisor or engineer as needed, performs recurring work independently. Work is reviewed for technical adequacy or conformity with instructions.
- CompTIA Security+ Certification
- Employer Supplemented Health Insurance
- Employer Paid Dental and Vision Insurance
- Employer Paid Life and AD&D Insurance
- 3% Biweekly 401(k) Contribution
- Paid Time Off
- Tuition and Certification Reimbursement
- Competitive Salaries with Performance Incentives
- A positive working environment with supportive teammates and leadership
ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see and
ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website for further information on all our EEO/VEVRAA policies.
Thank you for your interest in ITC Defense!
#J-18808-LjbffrSystem & Network Administrator (Mid-Level)
Posted today
Job Viewed
Job Description
Company Description
AFAQY, a leading IT and IoT service provider in Saudi Arabia and the MENA region, serves a diverse range of reputable clients across various industries. Since its launch in 2005, AFAQY has partnered with major names in the IT and IoT sectors to develop solutions that enhance business performance by automating workflows, optimizing internal processes, and improving customer experience. AFAQY's talented team of engineers, designers, and developers has a proven track record of overachieving expectations and delivering game-changing solutions. The company operates in Saudi Arabia, Egypt, Oman, and Qatar, with a focus on value for money, safety without complexity, and sustainability.
Responsibilities
· Install, configure, and maintain servers (Windows/Linux) and network equipment (switches, routers, firewalls).
· Administer and monitor virtual environments (VMware vSphere/ESXi), including provisioning, performance tuning, and resource optimization.
· Monitor system performance, troubleshoot hardware/software/network issues, and ensure high availability.
· Ensure data security through firewalls, VPNs, endpoint protection, and access controls.
· Perform routine backups, disaster recovery tests, and maintain documentation.
· Support end-users with technical issues related to systems, applications, and connectivity.
· Collaborate with vendors and service providers for system upgrades or troubleshooting.
· Assist in IT projects such as system migrations, cloud integration, and infrastructure improvements.
Qualifications
· Bachelor's degree in computer science, Information Technology, or related field.
· 3–5 years of experience as a System or Network Administrator.
· Solid knowledge of Windows Server and/or Linux administration.
· Hands-on experience with networking (TCP/IP, VLANs, routing, switching, VPN).
· Experience with virtualization technologies (VMware).
· Strong troubleshooting, problem-solving, and communication skills.
· Relevant certifications (CCNA, MCSA, CompTIA Network+, etc.) preferred.
Network & Server Admin
Posted 7 days ago
Job Viewed
Job Description
Job Title: Network & Server Admin
DescriptionLime Vizio Inc is a premier floral and gifting company, delivering flowers since 2010. LIME VIZIO has a tradition of excellence in flower delivery, and today we are one of the largest and most trusted online floral and gift retailers in the US and Canada.
LIME VIZIO takes pride in being a leader in quality, innovation, artistry, and dependability. Our entrepreneurial culture and unwavering commitment to our people create a dynamic work environment that celebrates collaboration, quality, superior service, and constant innovation.
LIME VIZIO is an e-commerce technology company focused on providing product development and services support on multiple processes, domains, and technologies.
A Network & Server Admin at Blossom Flowers will have an essential role in administering and managing the company’s local area network and cloud-based hostings.
The Network & Server Admin will require troubleshooting, cloud hosting related technical issues, in addition to providing hardware and software support and solutions to employees as well as clients. It also requires a good understanding of Linux.
Required Skills- 1+ years of experience working on cloud hosting environments. AWS environment with good understanding and knowledge
- Have a good understanding of managing systems and services on cloud providers like AWS or GCP
- Sound understanding of working on different Linux distributions like Ubuntu, Centos, Debian, etc
- Good understanding of web servers (Apache, Nginx, etc), SQL databases & PHP/Node.js/Python installation as well as configuration
- Command-line tools knowledge (ex. SSH, Bash)
- Experience in any scripting language (Bash scripting, python, etc)
- 1+ years experience in networking including LAN, WAN, Wi-Fi, Router/Firewall Management, etc.
- The candidate should be proficient in troubleshooting OS and network-related issues with good interpersonal communication skills and good presentation skills.
- Thorough understanding of Windows, Linux, and macOS desktop environments.
- Experience and knowledge of managing Linux-based hosting servers (Ex. AWS EC2 instances).
- Basic understanding of DevOps concepts can be a plus
- Experience/Knowledge of Monitoring Services for hosted systems.
- Should be proactive with managing and defining options in a cloud environment.
- G Suite Management.
- Working experience in managing Unifi Controllers and Ubiquiti routers.
- IPv6 networking experience.
- Good Communication Skills.
- Troubleshoot desktop computer issues: Identify, investigate and resolve problems in the quickest way possible.
- Look after a firewall and content filter.
- Handle all the server roles such as DNS, Web Server, Database Server, etc.
- Manage cloud hosting servers, and services installed on those servers.
- Communicate with cloud hosting support for technical queries.
- Work on hosting servers to create/update sites and install new software/services.
- Manage and control server(s) via SSH.
- Configure file permissions for various websites.
- Maintain prevention plans to keep websites secure from hacking attempts.
- Look after all network/server-related tasks and regularly come up with strategies for improvement.
- Regular documentation on server and network policies and protocols.
Be The First To Know
About the latest Linux server Jobs in Oman !
Server & Data center Engineer
Posted today
Job Viewed
Job Description
JD For Server & Datacenter Engineer
· System design: Analyze requirements and design scalable and reliable IT infrastructure solutions, which can include physical servers, virtual machines, storage systems, and cloud-based resources.
· Deployment and configuration: Install, configure, and provision servers, storage devices, and other infrastructure hardware and software.
· Performance monitoring: Continuously monitor system and network performance using various tools to proactively identify and resolve potential issues.
· Troubleshooting: Diagnose and resolve complex problems related to server, network, and storage systems to minimize downtime.
· Security management: Implement and enforce security best practices, including access controls, patch management, and vulnerability remediation, to protect company data and systems.
· Backup and disaster recovery: Develop, implement, and test backup and disaster recovery plans to ensure business continuity.
· Documentation: Maintain accurate and comprehensive documentation of system configurations, processes, and network diagrams.
· Technical leadership: Mentor junior and mid-level engineers, provide technical guidance, and lead the infrastructure projects.
· Cross-functional collaboration: Work closely with other IT teams, such as network and security, to ensure seamless integration and support.
Required skills and qualifications
Technical skills:
· Operating Systems: In-depth knowledge of Windows Server and/or various Linux distributions (e.g., Ubuntu, RHEL).
· Virtualization: Hands-on experience with virtualization platforms like VMware, Hyper-V, or KVM.
· Cloud Computing: Experience with major cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP).
· Active Directory: Strong understanding of Domain protocols and services (TCP/IP, DNS, DHCP),
· Storage Technologies: Knowledge of storage solutions, including Storage Area Networks (SAN), Network-Attached Storage (NAS), and cloud storage services.
· Monitoring and Logging: Experience with monitoring tools like Prometheus, Zabbix, or Datadog.
· UPS: Performing routine inspections, preventive maintenance. Diagnosing and resolving technical issues with UPS systems and related power infrastructure.
if you are interested kindly share your cv to or contact
Job Type: Full-time
Pay: RO RO per month
Unix and Linux Administrator with Oracle knowledge
Posted 16 days ago
Job Viewed
Job Description
Integral Solutions, Oman
Outsourced consultant to our customer which is enterprise organization, Maintain and support Unix and Linux server .Servers mainly running Oracle 9i AS.
Job SpecificationSound Knowledge of Installing , Restoring , Backup , Trouble shooting Unix and Linux . Sound knowledge administrating Oracle services.
Information Technology and Services - Muscat, Oman
mustakbil.com asks for your consent to use your personal data to:perm_identity
- perm_identity Personalised advertising and content, advertising and content measurement, audience research and services development
- devices Store and/or access information on a device
Data preferences
You can choose how your personal data is used. Vendors want your permission to do the following:
Store and/or access information on a deviceAdvertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertisingInformation about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertisingAdvertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised contentContent presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performanceInformation regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sourcesReports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve servicesInformation about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select contentContent presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errorsYour data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and contentCertain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Match and combine data from other data sourcesInformation about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automaticallyWith your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Vendors can use your data to provide services. Declining a vendor can stop them from using the data you shared.
Exponential Interactive, Inc d/b/a VDX.tvData collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Device identifiers
Data collected and processed: Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: Users’ profiles
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Privacy choices, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Integral Ad Science (incorporating ADmantX)Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device identifiers, Precise location data
Data collected and processed: Non-precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data
Data collected and processed: IP addresses, Device characteristics
Data collected and processed: IP addresses, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device identifiers
Adobe Audience Manager, Adobe Experience PlatformData collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Users’ profiles, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Privacy choices, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Marketing Science Consulting Group, Inc. #J-18808-LjbffrServer & Datacenter Engineer (For Omanis and expat in Oman only
Posted today
Job Viewed
Job Description
Server & Datacenter Engineer (For Omanis and expat in Oman only)
- System design: Analyze requirements and design scalable and reliable IT infrastructure solutions, which can include physical servers, virtual machines, storage systems, and cloud-based resources.
- Deployment and configuration: Install, configure, and provision servers, storage devices, and other infrastructure hardware and software.
- Performance monitoring: Continuously monitor system and network performance using various tools to proactively identify and resolve potential issues.
- Troubleshooting: Diagnose and resolve complex problems related to server, network, and storage systems to minimize downtime.
- Security management: Implement and enforce security best practices, including access controls, patch management, and vulnerability remediation, to protect company data and systems.
- Backup and disaster recovery: Develop, implement, and test backup and disaster recovery plans to ensure business continuity.
- Documentation: Maintain accurate and comprehensive documentation of system configurations, processes, and network diagrams.
- Technical leadership: Mentor junior and mid-level engineers, provide technical guidance, and lead the infrastructure projects.
- Cross-functional collaboration: Work closely with other IT teams, such as network and security, to ensure seamless integration and support.
Required skills and qualifications
Technical skills:
- Operating Systems: In-depth knowledge of Windows Server and/or various Linux distributions (e.g., Ubuntu, RHEL).
- Virtualization: Hands-on experience with virtualization platforms like VMware, Hyper-V, or KVM.
- Cloud Computing: Experience with major cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP).
- Active Directory: Strong understanding of Domain protocols and services (TCP/IP, DNS, DHCP),
- Storage Technologies: Knowledge of storage solutions, including Storage Area Networks (SAN), Network-Attached Storage (NAS), and cloud storage services.
- Monitoring and Logging: Experience with monitoring tools like Prometheus, Zabbix, or Datadog.
- UPS: Performing routine inspections, preventive maintenance. Diagnosing and resolving technical issues with UPS systems and related power infrastructure.
Qualifications:
- 3 to 5 Years experience, A bachelor's degree in computer science, information technology, or a related field is often preferred.
- Relevant professional certifications are highly desirable and can include:
- Microsoft Certified: Azure Administrator
- AWS Certified Solutions Architect
- VMware Certified Professional (VCP)
Soft skills:
- Problem-solving: Ability to quickly and effectively diagnose and resolve complex technical issues.
- Communication: Excellent verbal and written communication skills to collaborate with technical and non-technical stakeholders.
- Time management: Strong organizational and time-management abilities to handle multiple projects and tasks.
- Teamwork: A collaborative mindset for working effectively within a team environment.
- Continuous learning: A proactive attitude and passion for staying up-to-date with emerging technologies.
- System design: Analyze requirements and design scalable and reliable IT infrastructure solutions, which can include physical servers, virtual machines, storage systems, and cloud-based resources.
- Deployment and configuration: Install, configure, and provision servers, storage devices, and other infrastructure hardware and software.
- Performance monitoring: Continuously monitor system and network performance using various tools to proactively identify and resolve potential issues.
- Troubleshooting: Diagnose and resolve complex problems related to server, network, and storage systems to minimize downtime.
- Security management: Implement and enforce security best practices, including access controls, patch management, and vulnerability remediation, to protect company data and systems.
- Backup and disaster recovery: Develop, implement, and test backup and disaster recovery plans to ensure business continuity.
- Documentation: Maintain accurate and comprehensive documentation of system configurations, processes, and network diagrams.
- Technical leadership: Mentor junior and mid-level engineers, provide technical guidance, and lead the infrastructure projects.
- Cross-functional collaboration: Work closely with other IT teams, such as network and security, to ensure seamless integration and support.
Required skills and qualifications
Technical skills:
- Operating Systems: In-depth knowledge of Windows Server and/or various Linux distributions (e.g., Ubuntu, RHEL).
- Virtualization: Hands-on experience with virtualization platforms like VMware, Hyper-V, or KVM.
- Cloud Computing: Experience with major cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP).
- Active Directory: Strong understanding of Domain protocols and services (TCP/IP, DNS, DHCP),
- Storage Technologies: Knowledge of storage solutions, including Storage Area Networks (SAN), Network-Attached Storage (NAS), and cloud storage services.
- Monitoring and Logging: Experience with monitoring tools like Prometheus, Zabbix, or Datadog.
- UPS: Performing routine inspections, preventive maintenance. Diagnosing and resolving technical issues with UPS systems and related power infrastructure.
Qualifications:
- 3 to 5 Years experience, A bachelor's degree in computer science, information technology, or a related field is often preferred.
- Relevant professional certifications are highly desirable and can include:
- Microsoft Certified: Azure Administrator
- AWS Certified Solutions Architect
- VMware Certified Professional (VCP)
Soft skills:
- Problem-solving: Ability to quickly and effectively diagnose and resolve complex technical issues.
- Communication: Excellent verbal and written communication skills to collaborate with technical and non-technical stakeholders.
- Time management: Strong organizational and time-management abilities to handle multiple projects and tasks.
- Teamwork: A collaborative mindset for working effectively within a team environment.
- Continuous learning: A proactive attitude and passion for staying up-to-date with emerging technologies.
- System design: Analyze requirements and design scalable and reliable IT infrastructure solutions, which can include physical servers, virtual machines, storage systems, and cloud-based resources.
- Deployment and configuration: Install, configure, and provision servers, storage devices, and other infrastructure hardware and software.
- Performance monitoring: Continuously monitor system and network performance using various tools to proactively identify and resolve potential issues.
- Troubleshooting: Diagnose and resolve complex problems related to server, network, and storage systems to minimize downtime.
- Security management: Implement and enforce security best practices, including access controls, patch management, and vulnerability remediation, to protect company data and systems.
- Backup and disaster recovery: Develop, implement, and test backup and disaster recovery plans to ensure business continuity.
- Documentation: Maintain accurate and comprehensive documentation of system configurations, processes, and network diagrams.
- Technical leadership: Mentor junior and mid-level engineers, provide technical guidance, and lead the infrastructure projects.
- Cross-functional collaboration: Work closely with other IT teams, such as network and security, to ensure seamless integration and support.
Required skills and qualifications
Technical skills:
- Operating Systems: In-depth knowledge of Windows Server and/or various Linux distributions (e.g., Ubuntu, RHEL).
- Virtualization: Hands-on experience with virtualization platforms like VMware, Hyper-V, or KVM.
- Cloud Computing: Experience with major cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP).
- Active Directory: Strong understanding of Domain protocols and services (TCP/IP, DNS, DHCP),
- Storage Technologies: Knowledge of storage solutions, including Storage Area Networks (SAN), Network-Attached Storage (NAS), and cloud storage services.
- Monitoring and Logging: Experience with monitoring tools like Prometheus, Zabbix, or Datadog.
- UPS: Performing routine inspections, preventive maintenance. Diagnosing and resolving technical issues with UPS systems and related power infrastructure.
Qualifications:
- 3 to 5 Years experience, A bachelor's degree in computer science, information technology, or a related field is often preferred.
- Relevant professional certifications are highly desirable and can include:
- Microsoft Certified: Azure Administrator
- AWS Certified Solutions Architect
- VMware Certified Professional (VCP)
Soft skills:
- Problem-solving: Ability to quickly and effectively diagnose and resolve complex technical issues.
- Communication: Excellent verbal and written communication skills to collaborate with technical and non-technical stakeholders.
- Time management: Strong organizational and time-management abilities to handle multiple projects and tasks.
- Teamwork: A collaborative mindset for working effectively within a team environment.
- Continuous learning: A proactive attitude and passion for staying up-to-date with emerging technologies.
*
Salary will be negotiable
Job Types: Full-time, Permanent