Opis stanowiska
Lokalizacja WARSZAWA,Polska,mazowieckie,-
Języki angielski
About the employer
our client is a leading company operating in the energy sector, responsible for managing and developing critical infrastructure that supports the reliable transmission of electricity across large regions.
Responsibilities
• configuration, deployment, and maintenance of containerized applications on OpenShift, using manifests, Helm charts, templates, and operators,
• managing application namespaces and projects, including RBAC configuration, quotas, limit ranges, and resource management,
• configuration of application exposure and routing, including routes, services, TLS, external access, and load balancing,
• implementation and maintenance of application security, including SCC, PodSecurity, network policies, and secrets rotation,
• application scaling and optimization, including resource tuning, performance troubleshooting, and capacity improvements,
• support for development teams, including pod troubleshooting, log and event analysis, restarts, and rollbacks,
• collaboration on requests for new application functionalities and resource provisioning,
• monitoring application health and performance, including alerts, dashboards, and capacity planning,
• preparation and maintenance of technical documentation, including SOPs, application runbooks, and operational guides.
Requirements
• required certificates, at least 1 certification among Red Hat Certified OpenShift Administrator or an equivalent certification, or at least 3 years of additional experience in OpenShift Administration beyond the required minimum experience, with all equivalent certifications being internationally recognized and subject to acceptance by the Contracting Authority,
• experience in deploying, configuring, and maintaining containerized applications on Red Hat OpenShift,
• expertise in working with YAML, Helm Charts, and OpenShift Templates for application deployment,
• knowledge of the OpenShift application model including Projects and Namespaces, Service Accounts, Secrets, ConfigMaps, and related components,
• knowledge of application security configurations including Pod Security Admission and Standards, Security Context Constraints, Network Policies per application, and image signing or scanning,
• experience in application scaling and optimization including Horizontal Pod Autoscaler, Vertical Pod Autoscaler, resource requests and limits, and probes,
• knowledge of application exposure mechanisms including Routes, Services, Ingress, ExternalName, TLS termination, and API Gateway patterns,
• experience in CI/CD for OpenShift applications including Pipelines, Jenkins, Argo CD, and GitOps approaches,
• minimum 3 years of hands-on experience with OpenShift applications including deployment, troubleshooting, scaling, and configuration,
• experience in managing application projects and namespaces including creation, quotas, limit ranges, and RBAC configuration,
• practical knowledge of configuring and troubleshooting Routes, Services, and Ingress including TLS and path-based routing,
• experience in implementing Network Policies and Security Constraints at application and namespace level,
• experience in application monitoring and logging using OpenShift native tools as well as Prometheus, Grafana, and application-specific metrics,
• expertise in GitOps and Argo CD including deployment of changes from Git into specific namespaces and applications using Helm Charts,
• strong scripting and automation skills including Ansible, Python, and Helm-based automation.
Źródło: Indeed