Posted today
Systems Engineer
Tata Consultancy Services - Chicago, IL
Windows Server Administration:

  1. In-depth knowledge of Windows Server features, roles, and functionalities.
  2. Understanding of Active Directory and Group Policy for managing configurations across multiple servers.
  3. Familiarity with various Windows Server editions (Standard, Datacenter, etc.) and their licensing requirements.
  4. Security Best Practices:
  5. Comprehensive understanding of security principles like least privilege, separation of duties, and defense in depth.
  6. Awareness of common security vulnerabilities affecting Windows servers and mitigation strategies.
  7. Ability to configure Group Policy Objects (GPOs) to enforce security settings on domain-joined servers.
  8. Hardening Techniques:
  9. Expertise in hardening essential services like Remote Desktop Protocol (RDP), file sharing, and network services.
  10. Knowledge of user account management, password policies, and strong authentication methods (e.g., MFA).
  11. Understanding of firewall configuration to restrict access to authorized traffic only.
  12. Scripting and Automation Skills:
  13. Proficiency in scripting languages like PowerShell or Python to automate server hardening tasks.
  14. Familiarity with configuration management tools like Ansible, Chef, or Puppet (optional, but highly beneficial).
  15. Windows Command Line Interface (CLI) Knowledge:
  16. Ability to use the wmic, gpresult, regedit, and other command-line tools for managing and verifying server configurations.


Role Description

  1. Provides an overview of server security status and helps configure security settings.
  2. Utilize tools like Security Compliance Toolkit (SCT) and Microsoft Security Baseline Analyzer (MSBA) for automated assessments and baseline configuration recommendations.
  3. Configure Windows Event Viewer and use advanced tools like Security Information and Event Management (SIEM) for centralized log collection and analysis.
  4. Implementation and Verification:
  5. Applying Group Policy settings for user rights, local security policies, and auditing.
  6. Configuring local security settings such as password complexity, account lockouts, and file permissions.
  7. Disabling unused services and features to reduce the attack surface.
  8. Installing and configuring security software like antivirus, endpoint detection and response (EDR), and firewalls.
  9. Writing scripts to automate tasks
  10. Test the effectiveness of implemented hardening measures using vulnerability scanning tools and penetration testing methodologies.
  11. Document the hardening process, configuration changes, and security baselines for reference and future audits.