Job description
• Configure, manage, and support Ivanti Patch Management tools for Windows, Linux, and third-party applications.
• Schedule, test, and deploy security patches, updates, and hotfixes across servers and endpoints.
• Automate patching workflows to improve efficiency and reduce risk.
• Maintain compliance with security standards and patching SLAs.
• Monitor patch deployment status, remediation efforts, and compliance levels.
• Generate and maintain detailed patching reports for audits and leadership reviews.
• Collaborate with Information Security to interpret vulnerability scan results and prioritize patching efforts.
• Ensure compliance with internal policies and industry standards (CIS, NIST, PCI, SOX, etc.).
• Act as SME for endpoint and server patch management during security assessments.
• Maintain Ivanti servers, consoles, agents, and related infrastructure.
• Optimize patch groups, deployment tasks, scan configurations, and patch catalogs.
• Conduct regular tool updates, configuration tuning, and health checks.
• Work with system administrators, network teams, and application owners to schedule and validate patch cycles.
• Provide documentation and technical support for patching processes.
• Participate in on-call rotations or after-hours patching as required.
Requirements• 2+ years of experience with Ivanti Patch Management, Ivanti Security Controls, or Ivanti Endpoint Manager.
• Strong understanding of Windows Server and Windows OS.
• Experience with third-party application patching, especially Adobe, Java, Chrome, and enterprise app bundles.
• Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7).
• Strong scripting skills (PowerShell preferred).
• Understanding of Active Directory, Group Policy, networking and system administration
Preferred Qualifications• Ivanti certifications (ICEM, ICSM, Ivanti EPM certification).• Experience with SCCM/MECM, WSUS, JAMF, or other endpoint management tools.
This job post has been translated by AI and may contain minor differences or errors.