Request for system administrator with programming skills – Remote work, Lima

Company description

Blobfish is a small (but growing) company, located in Campoy, San Juan de Lurigancho, Lima. Specialized in PKI (Public Key Infrastructure) and now we are looking for a person with a system administrator with programming skills background to help us to maintain our own systems as well as the systems for our clients. With us you will have the chance to become a real sysadmin specialist as we always favor the work on the details over simple speed to deliver.

Requested applicant profile

Required background

  • Good experience with Linux and comfort working from a CLI.
  • Very good level in at least one programming language, e.g. C, C++, PHP, Java, Perl, Python, etc.
  • Shell scripting (e.g. Bash).
  • Familiarity with common Linux services (e.g. Apache HTTP Server, NGINX, Postfix, Dovecot, MySQL).
  • Strong experience with versioning control systems (e.g. Git).
  • Networking (TCP/IP, routing, firewalls, etc.)

Other requirements

Note that there is no requirement for having any formal studies completed.

  • Decent level writing and reading in English.
  • Proactivity and responsibility.
  • Comfort for self-learning.
  • Structured approach for solving problems.


Note that there will always be plenty of time for calmly investigating how to perform the following tasks.

  • Infrastructure management:
    • Hypervisor management (e.g. Proxmox VE).
    • Keep systems (mostly Linux) up to date writing procedures for manual or automated upgrades.
    • Set up centralized management for several systems (mainly Linux based).
    • Manage any type of service (mostly Linux based).
    • Network management (e.g. firewall).
    • Management of monitoring systems (e.g. Nagios Core).
    • Some office hardware management (e.g. Raspberry Pi).
  • Deep analysis and full understanding (to the source code level) of third party open source services (e.g. NGINX).
  • Third party code debugging and patching in any programming language.
  • Programming and scripting mainly for infrastructure oriented tasks (e.g. scripts for automating backups).

Tests for applicants

Applicants will be required to pass tests similar to the following ones:

Proposed work conditions

Working hours

  • Remote work hours are from Monday through Friday from 9am to 6pm, but the work schedule is completely flexible, provided that the work hours are completed during the week and the proposed objectives are achieved.

Working conditions

  • The salary for the first month (trial period) will be S/.2,500 but it could increase depending on the person’s performance.


  • Initially it is required that the applicant use his own computer. Later a computer will be provided.
  • Having a reliable Internet connection at home.

If you are interested, send your CV to, place in the Subject: “System Administrator”.

Perform a GET OCSP request in (almost) one line

First, it is required to define the following function:

$ urlencode () 
> { 
>     python -c "import urllib; print urllib.quote('''$1''', '')"
> }

Then the OCSP request can be performed like this:

$ curl$(urlencode `openssl ocsp -issuer issuer.pem -cert end_entity.pem -reqout - | base64 -w 0`) | openssl ocsp -respin - -text -CAfile rootca.pem
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: 98D1F86E10EBCF9BEC609F18901BA0EB7D09FD2B
    Produced At: Nov 11 14:16:01 2019 GMT

Load PKCS #11 key using PuTTY-CAC Pageant from command line

This post assumes that you already installed PuTTY-CAC from and you understand how to use PuTTY-CAC to load PKCS #11 certificates from the GUI:

But, given that I’ve been unable to find the documentation to perform this operation from the CLI I’ve checked the PuTTY-CAC source code and found that the correct command is the following one:

>pageant.exe PKCS:716B8B58D8F2C3A7F98F3F645161B1BF9818B689=C:/Windows/SysWOW64/opensc-pkcs11.dll


  • 716B8B58D8F2C3A7F98F3F645161B1BF9818B689 is the SHA-1 for the certificate itself in DER (binary) format.
  • C:/Windows/SysWOW64/opensc-pkcs11.dll is the PKCS #11 module path.
WP2Social Auto Publish Powered By :