BravoTECH
Overview
Be among the first 25 applicants. This range is provided by BravoTECH. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range:
$90.00/yr - $95.00/yr
A hands-on engineer who turns patching strategy into consistent, reliable delivery across multiple customers. You’ll partner closely with our Patch Management Architect to execute standard baselines, automate remediation, improve reporting, and uplevel our 24/7 operations teams.
What You’ll Do
Operations & Delivery
Own day-to-day patch cycles across
N-able ,
ConnectWise Asio , and
Microsoft Intune
in a multi-tenant MSP setup.
Execute deployments per client baselines/schedules defined with the Patch Architect; validate pilots, monitor compliance, and drive remediation to SLAs.
Tune alert thresholds and policies to reduce noise, improve endpoint health, and catch failed/blocked updates early.
Serve as
L3 escalation
for complex patch failures across
Windows ,
macOS ,
Linux , and common third-party apps.
Coordinate out-of-band/zero-day actions and rollback plans as needed.
Automation, Scripting & Packaging
Build/maintain detection & remediation automations within RMM/Intune; package and update third-party applications at scale.
Write production-ready
PowerShell
and
Bash
(Python/Ansible a plus); use version control and peer reviews.
Automate compliance and executive reporting (dashboards, scheduled reports) for internal reviews and customer QBRs.
Partner with the
Patch Architect
and
Client Relationship Manager
to translate requirements into executable plans; join select client calls as the patching SME.
Work with
NOC
and
Security/Vuln Management
to align CVE remediation with patch windows and change processes.
Mentor
Level 2
analysts in a 24/7 model; create clear runbooks to improve first-touch resolution.
Documentation & Governance Support
Create and maintain SOPs/runbooks for patch workflows, escalation paths, exception handling, and change records.
Contribute to problem/RCA documents and drive corrective actions into tooling and SOPs.
What You’ll Need (Must-Have)
5+ years
in IT ops/systems administration, including
3+ years
focused on enterprise patching (ideally MSP/multi-tenant).
Strong, practical experience with
N-able ,
ConnectWise Asio , and
Microsoft Intune
(update rings/autopatch concepts).
OS patching depth in
Windows ; working knowledge of
macOS
and
Linux ; experience packaging and updating third-party apps at scale.
Solid
PowerShell
and
Bash
skills for automation and remediation; comfort with source control and code reviews.
Proven track record producing SOPs/runbooks and enabling L2 teams in a global/shifted environment.
Familiarity with compliance drivers (e.g.,
SOC 2 ,
ISO 27001 ,
NIST ,
CIS ) and their impact on patch SLAs and reporting.
Clear communicator who can turn strategy into repeatable, measurable execution across many clients.
Nice to Have
Vulnerability tooling:
Tenable ,
Qualys ,
Rapid7 ,
Defender for Endpoint .
ITSM:
ServiceNow ,
BMC Helix , or
Jira Service Management
(workflow integration, change).
Hybrid cloud patching (Azure/AWS), WSUS/GPO familiarity.
Senioriry level
Mid-Senior level
Employment type
Full-time
Job function
Information Technology
Industries
Dallas, TX and other locations are listed with salary ranges and dates on the original posting. Referrals may increase interview chances.
#J-18808-Ljbffr
Base pay range:
$90.00/yr - $95.00/yr
A hands-on engineer who turns patching strategy into consistent, reliable delivery across multiple customers. You’ll partner closely with our Patch Management Architect to execute standard baselines, automate remediation, improve reporting, and uplevel our 24/7 operations teams.
What You’ll Do
Operations & Delivery
Own day-to-day patch cycles across
N-able ,
ConnectWise Asio , and
Microsoft Intune
in a multi-tenant MSP setup.
Execute deployments per client baselines/schedules defined with the Patch Architect; validate pilots, monitor compliance, and drive remediation to SLAs.
Tune alert thresholds and policies to reduce noise, improve endpoint health, and catch failed/blocked updates early.
Serve as
L3 escalation
for complex patch failures across
Windows ,
macOS ,
Linux , and common third-party apps.
Coordinate out-of-band/zero-day actions and rollback plans as needed.
Automation, Scripting & Packaging
Build/maintain detection & remediation automations within RMM/Intune; package and update third-party applications at scale.
Write production-ready
PowerShell
and
Bash
(Python/Ansible a plus); use version control and peer reviews.
Automate compliance and executive reporting (dashboards, scheduled reports) for internal reviews and customer QBRs.
Partner with the
Patch Architect
and
Client Relationship Manager
to translate requirements into executable plans; join select client calls as the patching SME.
Work with
NOC
and
Security/Vuln Management
to align CVE remediation with patch windows and change processes.
Mentor
Level 2
analysts in a 24/7 model; create clear runbooks to improve first-touch resolution.
Documentation & Governance Support
Create and maintain SOPs/runbooks for patch workflows, escalation paths, exception handling, and change records.
Contribute to problem/RCA documents and drive corrective actions into tooling and SOPs.
What You’ll Need (Must-Have)
5+ years
in IT ops/systems administration, including
3+ years
focused on enterprise patching (ideally MSP/multi-tenant).
Strong, practical experience with
N-able ,
ConnectWise Asio , and
Microsoft Intune
(update rings/autopatch concepts).
OS patching depth in
Windows ; working knowledge of
macOS
and
Linux ; experience packaging and updating third-party apps at scale.
Solid
PowerShell
and
Bash
skills for automation and remediation; comfort with source control and code reviews.
Proven track record producing SOPs/runbooks and enabling L2 teams in a global/shifted environment.
Familiarity with compliance drivers (e.g.,
SOC 2 ,
ISO 27001 ,
NIST ,
CIS ) and their impact on patch SLAs and reporting.
Clear communicator who can turn strategy into repeatable, measurable execution across many clients.
Nice to Have
Vulnerability tooling:
Tenable ,
Qualys ,
Rapid7 ,
Defender for Endpoint .
ITSM:
ServiceNow ,
BMC Helix , or
Jira Service Management
(workflow integration, change).
Hybrid cloud patching (Azure/AWS), WSUS/GPO familiarity.
Senioriry level
Mid-Senior level
Employment type
Full-time
Job function
Information Technology
Industries
Dallas, TX and other locations are listed with salary ranges and dates on the original posting. Referrals may increase interview chances.
#J-18808-Ljbffr