System Security Administrator

Arlington, Virginia

Applications have closed

This position will perform the tasks of a System Administrator-Security (SYSADSEC) for multiple Department of Defense (DoD) and Intelligence Community (IC) programs.  The SYSADSEC will work under the direction of the Security Department leads.  Candidates must be knowledgeable of information technology and security principles.  This is a multi-tasking environment that demands customer service, communication, and organizational skills. Successful experience implementing and supporting the Risk Management Framework (RMF) as defined in the DOD, JAFAN, JSIG, NISPOM, and IC directives is required. All candidates require experience implementing and supporting Defense Information System Agency (DISA) Secure Technical Implementation Guides (STIG) for Red Hat Linux and Microsoft Windows Operating Systems. Additional responsibility will be to assist the IT team supporting facility IT infrastructure and networking capabilities within the organization.  

Responsibilities Include:

    • Conduct reviews and technical inspections to identify and mitigate potential security weaknesses and ensure that all security features applied to a system are implemented and functional.
    • Provide support to other cybersecurity personnel for maintaining appropriate operation information assurance (IA) posture for programs.
    • Ensure system processes are being followed by all personnel including privileged users. 
    • Assist with the overall security program (education, system documentation and controls, badging)
    • Provide recommendations and operational requirements for network environment
    • Manage computer operation scheduling, backup, storage, and retrieval functions
    • Develop and maintain the virtualization environment used by the team and services
    • Apply system security patches, and third-party updates on Linux and windows system
    • Design and document hardened baseline configurations for computer systems and network equipment.
    • Work closely with developers, software configuration teams, product teams, and customer support teams to ensure all security requirements are continuously being met.
  • Familiar with the Authority to Operate (ATO) documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment and Authorization (A&A) packages, Plan of Actions and Milestones (POA&M) and Security Controls Traceability Matrix (SCTM).

Minimum Qualifications:

  • Bachelor’s degree or equivalent experience (4-5 years) in Cybersecurity, IT, or a related field.
  • 4-5 years experience with end-user support, Linux and Windows systems, system integration, and IAM solutions.
  • 2-4 years experience in DoD accreditation processes and procedures.  
  • In accordance with DoD 8570.01M, the selected individual must meet the requirements of an active IAT Level II as a condition of employment and computing environment training/certification.
  • Identify multiple creative solutions to problems, including the strengths and weaknesses of each approach, and ways to measure results.
  • Demonstrated experience as a Linux and Windows system admin.
  • Strong background in network administration (For example: TCP/IP, UDP DNS, ARP, BGP, DNS, DHCP, HTTP, LDAP).
  • Knowledge of cyber defense and vulnerability assessment tools and their capabilities. (e.g., ACAS, SCAP, Nessus, and Qualys).
  • Knowledge of IT security principles and methods (e.g., firewalls, demilitarized zones, encryption).
  • Knowledge of system administration, network, and operating system hardening techniques. (e.g., DISA STIGs) Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Experience in managing computer operation scheduling, backup, storage and retrieval functions.
  • Skilled in assessing security controls based on the cybersecurity principles and tenets. (e.g., CIS, NIST SP 800-53 rev 4, NIST SP 800-171, Cybersecurity Framework, Security Maturity Models etc.).
  • Bachelor’s degree in Computer Science or related discipline from an accredited college or university. Prior experience as a Systems Administrator may be substituted for the degree. 
  • DoD Directive 8570.1 IAT/IAM Level II or higher certification. (CISSP preferred).
  • Bachelor’s degree in Computer Science or related discipline from an accredited college or university. Prior experience as a Systems Administrator may be substituted for the degree. 

Clearance/Citizenship:

  • Candidate must have Active TOP SECRET clearance with ability to obtain and maintain Special Compartmented Information (SCI) and Special Access Program (SAP) accesses.

Two Six Technologies is an Equal Opportunity Employer.  All qualified applicants will receive consideration for employment at Two Six Technologies without regard to race, color, religion,  national origin, sex, age, physical and mental disability, sexual orientation, gender identity or expression, genetic information, veteran, marital, pregnancy or citizenship status; or any other status prohibited by applicable national, federal, state or local law.

Two Six Technologies Covid-19 Vaccination Policy requires employees to be fully vaccinated. Exceptions to this policy are only granted to those with a company-approved medical or religious accommodation.  Prospective or new employees will be required to adhere to this policy and submit proof of vaccination or have an approved exemption prior to the start of their employment.   

If you are interested in applying for employment with Two Six Technologies and require an accommodation, please contact Human Resources at Two Six Technologies by sending an email to hr@twosixtech.com.  Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.

Tags: CISSP Clearance Computer Science Cyber defense DNS DoD DoDD 8570 Encryption Firewalls IAM IT infrastructure LDAP Linux Nessus NISPOM NIST Qualys Red Hat Risk assessment Risk Assessment Report Risk management SAP SCAP SCTM SRTM System Security Plan TCP/IP Top Secret Top Secret Clearance Windows

Perks/benefits: Gear Startup environment

Region: North America
Country: United States
Job stats:  2  0  0
Category: Admin Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.