
Network/System Administrator III
Gtangible Corporation
The Role
Overview
Manage and secure DoD networks and systems, including SAP, with incident response duties
Key Responsibilities
- network ops
- risk analysis
- siem management
- incident response
- group policy
- threat monitoring
Tasks
-Execute cybersecurity operations procedures for day to day network management, operations and maintenance. -Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes. -Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics. -Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes. -Assist during security assessments with regard to accuracy and efficiency. -Group Policy design and configuration. -Assist during security assessments of servers/network devices/security appliances. -Work as part of a security incident response team as needed. -Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports. -Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists. -Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office. -Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.
Requirements
- windows server
- red hat
- vmware
- sap
- dod 8570
- bachelor's
What You Bring
-Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware. -Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration. -Able to perform self-sustaining and work with little to no supervision. -Working knowledge and current relevant experience with PL2, PL3, and PL4 network environment systems. -Must be familiar with DoD policy as it applies to implementing and executing system and network administration. -Bachelors degree in a related area and 5-7 years of related experience OR Associates degree in a related area and 7-9 years of related experience OR 9-11 years of related experience without a degree. -Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper- V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office Toolkits, SIEMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris), video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security. -Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances. -Experience in effective communication and collaborating in a high performance team environment. -Minimum of 2 years of SAP experience required. -Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire. -Working knowledge of WSUs and/or YUM patch deployment methodologies. -Prior Air Force experience a plus. -Must be able to regularly lift up to 50 lbs.
People Also Searched For
Building Engineer jobs in Silver Spring , Maryland , US
Construction Project Coordinator jobs in Silver Spring , Maryland , US
Construction Coordinator jobs in Silver Spring , Maryland , US
Building Engineer jobs in Maryland , US
Construction Project Coordinator jobs in Maryland , US
Construction Coordinator jobs in Maryland , US
Building Engineer jobs in Silver Spring , US
Construction Project Coordinator jobs in Silver Spring , US
Construction Coordinator jobs in Silver Spring , US
Benefits
-National Security Programs
The Company
About Gtangible Corporation
-Founded in 2009, began as a veteran-led firm combining military insight with agile support services. -Registered as a service-disabled veteran-owned small business with Delaware incorporation and CAGE code for government contracting. -Delivers national security programs, administrative/program management, and mission/warfighter support across CONUS and OCONUS. -Over the past decade, secured multi-million-dollar contracts. -Typical projects include information assurance, network defense, logistics, training development, and theater security cooperation. -Expanded into international program support and energy-focused organizational development. -Maintains small-business agility with big-agency impact.
Sector Specialisms
Information Systems Security
Information Assurance
Computer Network Defense
Network Engineering
Systems Administration
IT Customer Support
Communications Security
Physical Security
Industrial Security
Personnel Security
Program Protection
Operations Security
Special Access Programs
Program Management
Program Analysis
Administrative and Office Services
Procurement/Acquisition Support
Financial and Budgetary
Travel Management
Logistics and Maintenance
Training Development and Trainers
C4ISR
Intelligence, Counterintelligence (CI), and Counterterrorism (CT)
Collections
Targeting
Force Protection
Manpower Analysis
Medical Management and Planning
Medical/Health IT
Special Investigations
Risk Analysis
Exercise Planning
Theater Security Cooperation Analysis
Meteorological and Weather Planning
Security Clearance
-requires top secret/sci security clearance with sap eligibility -consent for counterintelligence polygraph required
