About The Position

The Patch Management Specialist, Mid manages coordinated patching of operating systems, applications, and infrastructure components to maintain security, stability, and compliance for mission‑critical enterprise environments. The role plans and schedules patch cycles, evaluates patch criticality, and designs deployment approaches that minimize business disruption while meeting policy and regulatory requirements. The specialist oversees testing, phased rollout, and validation of patches across server and endpoint fleets and partners with security and operations teams to align remediation priorities.

Requirements

  • Bachelor’s degree in IT, Computer Science, or a related field, or equivalent relevant experience.
  • Typically 4–6 years of experience in patch management, systems administration, or related infrastructure security roles in medium to large enterprises.
  • Strong understanding of patch management principles and experience with tools such as Microsoft WSUS and SCCM.
  • Proven problem‑solving, analytical, communication, and interpersonal skills with the ability to manage multiple tasks effectively.
  • Experience in assessments, audits, and implementing automated patch management solutions, including maintaining schedules and ensuring timely deployment.
  • Ability to obtain and maintain a Secret clearance; U.S. citizenship required.

Nice To Haves

  • Familiarity with the specific federal program IT environment.
  • Relevant certifications such as CISSP, CPMP, or similar security/IT certifications.

Responsibilities

  • Lead assessment, testing, and deployment of OS and application patches across enterprise endpoints using centralized tools such as WSUS, SCCM, or comparable platforms.
  • Design and maintain patching schedules, phased rollout plans, and maintenance windows that minimize business impact while satisfying security and compliance requirements.
  • Perform advanced troubleshooting and remediation for failed or problematic patches, coordinating with system administrators and application owners on workarounds and permanent fixes.
  • Implement and tune automated patch management workflows, including device targeting, deployment rules, and deadlines to improve consistency and coverage.
  • Monitor vulnerability feeds, patch advisories, and compliance dashboards to prioritize patch deployment based on risk, impact, and defined service‑level expectations.
  • Document patch management procedures, baselines, exception handling, and reporting methods to support audits, assessments, and continuous improvement.
  • Collaborate closely with vulnerability management and security operations teams to align patch deployment with identified threats, zero‑day vulnerabilities, and regulatory obligations.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service