Rhel Jobs

27 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Intermediate ($$) - Est. Time: Less than 1 week, 10-30 hrs/week - Posted
The candidate will be provided with the information of the tools and some writing examples, the candidate must elaborate the technical and executive very creative reports in spanish. No translations, the reports must contain the information required by an executive to understand the current status of the network.
Skills: Red Hat Enterprise Linux (RHEL) Linux System Administration Microsoft Windows Server report writing
Hourly - Intermediate ($$) - Est. Time: Less than 1 week, Less than 10 hrs/week - Posted
I currently in need of a knowledgeable engineer capable of configuring a FreeRADIUS policy relating to MySQL. I have a requirement where multiple Radius Clients defined in the MySQL NAS table will be requesting authentication via FreeRADIUS where authentication must be accepted or rejected based on client. User information will be stored in the radcheck table where an additional colum will be created to match the NAS ID. When an authentication attempt comes in from a client for example,, the packet must add an additional radius attribute to the request prior to processing authentication. This attribute can be nasid={​id}​ Once the attribute is added, authentication can take place where looking for user information in the radcheck where nasid=# Other policy requirements are that two attributes be created; Session-Start Session-End These attributes will be stored in the radcheck table along with usernames in the date time format, i.e; "04-29-2016 06:29:59" If the request comes in from a client it must match the NAS ID and the current time not be earlier than the session-start or later then the session-end datetime
Skills: Red Hat Enterprise Linux (RHEL) MySQL Programming RADIUS
Hourly - Intermediate ($$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
The job consist in implementing the following Infrastructure: - Hortonworks Data Platform, with HDP™ 2.4: Ready for the enterprise Automated (with Ambari 2.2) including: >> Spark >> Hbase >> Yarn >> HDFS - Hortonworks Data Platform Add-Ons: >> Hortonworks Connector for Teradata v1.4.1 >> Hortonworks ODBC Driver for Apache Hive (v2.1.2) >> Hortonworks Data Platform Search (Apache Solr 5.2.1) - Apache Tika - Apache Kafka - Django Framework Installation must be done preferably on AWS. The infrastructure will need to have at least 3 nodes, 1 master, and a daily incremental backup. At least 10 users will need to have their access set up. Upon completion of the implementation, regular maintenance (weekly or bi-weekly) and upgrade will be required. Any further details will be provided upon request.
Skills: Red Hat Enterprise Linux (RHEL) Hadoop Linux System Administration Private Clouds
Hourly - Intermediate ($$) - Est. Time: Less than 1 month, 10-30 hrs/week - Posted
Looking for an experiences DevOps engineer to help us migrate our AWS instances to new generation, optimize them, setup multiple environments, setup efficient logging, good security and best practices. Create Docker images. Help with CI.
Skills: Red Hat Enterprise Linux (RHEL) Amazon EC2 DevOps Docker
Fixed Price Budget - Expert ($$$) - $50 to $250 - Posted
Hi I am working on a project developing a model of a Linux operating system using the pwnPr3d language. The model should contain all important parts of the chosen Linux distribution, including core applications, services and daemons, the network stack, the access control system, standard users (root, guest, etc.), file system, important data (password files, for instance), etc. There are probably other important parts of the system that I did not think of right now, but that needs to be identified as a part of this project. The model should be able to accurately predict whether a given Linux installation is susceptible to, at least, the following set of attacks: ARP spoofing Password brute forcing Encryption brute forcing Buffer overflows Privilege escalation Sandbox escape Man in the browser Remote Access Trojan Ransomware Other critical attacks that you realize (or should realize) during the project are more important than the above Expected outcome is in the form of a complete detailed report on a provided template. Please get back to me if you have further questions.
Skills: Red Hat Enterprise Linux (RHEL) Linux System Administration