Request for system administrator with programming skills for SJL, Lima

Company description

Blobfish is a small (but growing) company, located in Campoy, San Juan de Lurigancho, Lima. Specialized in PKI (Public Key Infrastructure) and now we are looking for a person with a system administrator with programming skills background to help us to maintain our own systems as well as the systems for our clients. With us you will have the chance to become a real sysadmin specialist as we always favor the work on the details over simple speed to deliver.

Requested applicant profile

Required background

  • Good experience with Linux and comfort working from a CLI.
  • Very good level in at least one programming language, e.g. C, C++, PHP, Java, Perl, Python, etc.
  • Shell scripting (e.g. Bash).
  • Familiarity with common Linux services (e.g. Apache HTTP Server, NGINX, Postfix, Dovecot, MySQL).
  • Strong experience with versioning control systems (e.g. Git).
  • Networking (TCP/IP, routing, firewalls, etc.)

Other requirements

Note that there is no requirement for having any formal studies completed.

  • Decent level writing and reading in English.
  • Proactivity and responsibility.
  • Comfort for self-learning.
  • Structured approach for solving problems.

Responsibilities

Note that there will always be plenty of time for calmly investigating how to perform the following tasks.

  • Infrastructure management:
    • Hypervisor management (e.g. Proxmox VE).
    • Keep systems (mostly Linux) up to date writing procedures for manual or automated upgrades.
    • Set up centralized management for several systems (mainly Linux based).
    • Manage any type of service (mostly Linux based).
    • Network management (e.g. firewall).
    • Management of monitoring systems (e.g. Nagios Core).
    • Some office hardware management (e.g. Raspberry Pi).
  • Deep analysis and full understanding (to the source code level) of third party open source services (e.g. NGINX).
  • Third party code debugging and patching in any programming language.
  • Programming and scripting mainly for infrastructure oriented tasks (e.g. scripts for automating backups).

Tests for applicants

Applicants will be required to pass tests similar to the following ones:

Proposed work conditions

Working hours

  • Working hours are from Monday to Friday from 9am to 6pm, but working schedule is totally flexible, i.e. you can come at 9am or 10am (or later) or don’t go to office a given day as long as work hours are completed during a week.

Working conditions

  • Salary for the first month (test period) will be of S/.2500 but it could be increased from the second month onwards depending on the person performance. Work will start as face-to-face in the office with the possibility to migrate to telecommuting depending on the performance of the employee.

If you are interested, send your CV to betsy@blobfish.pe, place in the Subject: “System Administrator”.

Perform a GET OCSP request in (almost) one line

First, it is required to define the following function:

$ urlencode () 
> { 
>     python -c "import urllib; print urllib.quote('''$1''', '')"
> }

Then the OCSP request can be performed like this:

$ curl http://ocsp.example.org/$(urlencode `openssl ocsp -issuer issuer.pem -cert end_entity.pem -reqout - | base64 -w 0`) | openssl ocsp -respin - -text -CAfile rootca.pem
...
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: 98D1F86E10EBCF9BEC609F18901BA0EB7D09FD2B
    Produced At: Nov 11 14:16:01 2019 GMT
...

Load PKCS #11 key using PuTTY-CAC Pageant from command line

This post assumes that you already installed PuTTY-CAC from https://github.com/NoMoreFood/putty-cac and you understand how to use PuTTY-CAC to load PKCS #11 certificates from the GUI:

But, given that I’ve been unable to find the documentation to perform this operation from the CLI I’ve checked the PuTTY-CAC source code and found that the correct command is the following one:

>pageant.exe PKCS:716B8B58D8F2C3A7F98F3F645161B1BF9818B689=C:/Windows/SysWOW64/opensc-pkcs11.dll

Where:

  • 716B8B58D8F2C3A7F98F3F645161B1BF9818B689 is the SHA-1 for the certificate itself in DER (binary) format.
  • C:/Windows/SysWOW64/opensc-pkcs11.dll is the PKCS #11 module path.
WP2Social Auto Publish Powered By : XYZScripts.com