Want to hear how I work? Hit play.Kablio AI applies for you. You just show up to the interviewKablio AI helps you secure roles in construction, clean energy, facilities management, engineering, architecture, sustainability, environment and other physical world sectors.
Get hired, get rewarded!
Land a job through Kablio and earn a 5% salary bonus.
Exclusive benefits
5%Bonus
Network/System Administrator III
Gtangible Corporation
Service‑disabled, veteran‑owned small business delivering national security, program, and mission support to U.S. government.
Administer and secure DoD networks/SAP systems, lead IT ops, support incidents.
12d ago
Intermediate (4-7 years)
Full Time
Hanscom Air Force Base, MA
Onsite
Company Size
46 Employees
Service Specialisms
Program Protection (Security)
Information Assurance
Interoperability
DIACAP
Program Security Managers
CIP & Automated Security Systems
Construction Management and Engineering Technicians
Human Capital Development
Sector Specialisms
Information Systems Security
Information Assurance
Computer Network Defense
Network Engineering
Systems Administration
IT Customer Support
Communications Security
Physical Security
Role
What you would be doing
incident response
siem management
group policy
network operations
security monitoring
cots management
Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office.
Work as part of a security incident response team as needed.
Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk.
Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.
Execute cybersecurity operations procedures for day to day network management, operations and maintenance.
Assist during security assessments with regard to accuracy and efficiency.
Group Policy design and configuration.
Assist with Creation of operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists.
Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes.
Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports.
Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes.
Assist during security assessments of servers/network devices/security appliances.
What you bring
dod8570
windows
rhel
virtualization
sap
patch management
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III within 6 months of the date of hire.
Prior Air Force experience a plus.
Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware.
5-7 years of related experience.
Working knowledge of virtualization as it applies to users environments, operating systems, and network appliances.
Bachelor's degree in a related area OR Associate's degree in a related area + 2 years' experience OR equivalent experience (Desired).
Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.
Able to perform self-sustaining and work with little to no supervision.
Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security.
Working knowledge and current relevant experience with PL2, PL3, and PL4 network environment systems.
Working knowledge of WSUs and/or YUM patch deployment methodologies.
Experience in effective communication and collaborating in a high performance team environment.
Must be able to regularly lift up to 50 lbs.
Minimum of 2 years of SAP experience required.
Must be familiar with DoD policy as it applies to implementing and executing system and network administration.
Benefits
National Security Programs
Training + Development
Information not given or found
Interview process
Information not given or found
Visa Sponsorship
Information not given or found
Security clearance
must obtain top secret/sci clearance and consent to a counterintelligence polygraph.
Hey there! Before you dive into all the good stuff on our site, let’s talk cookies—the digital kind. We use these little helpers to give you the best experience we can, remember your preferences, and even suggest things you might love. But don’t worry, we only use them with your permission and handle them with care.