Back
Back
Back
Back

Customer Job

Data Architecture Consultant - Expert (Automation Engineer)

Job ID: 26-00750
Pay rate range - $83/hr. to $86/hr.
Onsite

Apache HTTP Server & Tomcat Design + Ansible Automation Engineer

Job Description:
Role Summary

Design resilient, secure, and scalable Apache HTTP Server (httpd) and Apache Tomcat platforms for Java web applications. Build Ansible automation to provision, harden, operate, and upgrade httpd and Tomcat across dev/stage/prod. Partner with SRE, Security, and App teams to deliver high availability, predictable performance, and hands-off operations via GitOps and CI/CD.

Responsibilities
Architecture & Operations (Apache HTTPD + Tomcat)

• Design reverse proxy and app tier topologies:
o Single or dual Apache HTTPD layers (edge and internal), terminating TLS; mod_proxy_http or AJP (with hardening) to Tomcat.
o Active/active Tomcat clusters with load balancing & health checks (at Apache layer or external LB).
o Session management strategy: sticky sessions via cookie, or session replication/Redis-backed sessions when stickiness is not possible.

• Performance engineering:
o Apache MPM tuning (event/prefork), worker counts, KeepAlive, compression, caching (mod_cache), HTTP/2 where feasible.
o Tomcat connector threads, acceptCount, connectionTimeout, JVM sizing (Xms/Xmx), GC tuning (G1/Parallel), and thread pools.
o Connection reuse (HTTP keep-alive), upstream timeouts, and proper buffer sizing.

• High availability & scaling:
o Multi-AZ/region design, zero-downtime rolling deploys, blue/green cutovers.
o Canarying via path/host routing and weighted backends (LB or Apache ProxyPass with status routes).

• Security hardening:
o TLS 1.2+ (ideally 1.3) with strong cipher suites, HSTS, OCSP stapling; cert rotation via ACME/Let's Encrypt or enterprise PKI.
o Disable insecure HTTP methods; harden headers (CSP, X-Frame-Options, X-Content-Type-Options).
o For AJP, bind to localhost or private subnets, set secretRequired= "true " with secret, or disable AJP unless required.
o Tomcat hardening: remove default apps, lock down manager/host-manager, JMX protection, minimal privileges, log sanitization.

• Lifecycle management:
o Patch, upgrade, and config rollouts with Ansible; drift detection & remediation.
o Runbooks for incident handling, failover, and rollbacks.

Ansible Automation
• Develop idempotent Ansible roles and collections-based playbooks for:
o OS hardening, users/groups, limits, sysctl, firewalld/ufw.
o Apache install, vhosts, TLS, reverse proxy config, headers, logrotate.
o Tomcat install (tar or distro), systemd service, server.xml, connectors, JVM/GC flags, keystores, context.xml, logging.
o Application deployment hooks (WAR rollout with pre/post checks), health checks, and rollback.
o Rolling updates (serial strategy), blue/green or canary via inventory groups or variables.
o Integrations: JMX exporter, mod_status, metrics/log shipping agents.

• Safety guards: pre-flight checks (ports, disk, Java version), post-verify (HTTP 200/health, JMX metrics thresholds), and automated backout.
Collaboration & Governance
• Partner with App teams for capacity, route maps, and deployment patterns.
• Define standards, runbooks, and design docs; perform DR tests.
• Align with security frameworks (CIS, SOC2/ISO/PCI as applicable).

Must Have Requirements:
• 5+ years administering Apache HTTP Server and Apache Tomcat in production at scale.
• 3+ years Ansible (roles, collections, Molecule, CI/CD).
• Strong Linux (RHEL), networking, TLS/PKI, and load balancing fundamentals.
• JVM operation basics (heap/GC) and Java web app deployment experience.

Education:
• Post Secondary

 

CV or resume

Choose file
or drag and drop file here
For best results, upload *.doc/.docx/.pdf format files only (File size must be less than 2MB)

Personal information

Tell us something about yourself

How may I help you?