Cyber Systems Administration

Washington, DC, United States

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page

Responsibilities

Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle). Ensures that IS and cyber security plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS and cyber security. Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents and improve security. 

 

Key Responsibilities:

  • Maintain and mature enterprise group policy(s) for all components of the network.
  • Create and maintain an Enterprise Account Management Plan. At a minimum, the Enterprise Account Management Plan shall include, but is not limited to, processes for provisioning and deprovisioning, recertifying elevate accounts, and training requirements.
  • Create user accounts in accordance with organizational policy.
  • Manage user accounts/access control and groups per SLAs.
  • Provision of Elevated Privilege access rights for all Agency applications
  • Coordinate with account management and Server Operations to ensure PIV and PIV-A enabled account and server infrastructures are up to date on the Entrust Identity Guard (IDG) website.
  • Ensure RSA back-end applications (RSA software and tokens) are up to date.
  • Develop a centralized dynamic access management solution for privileged users, per NIST guidelines 800-53 and mature the process for controlling and monitoring users’ access.
  • Maintain and configure monthly granular security reports according to FISMA requirements.
  • Assess and monitor security operations and activities for compliance and produce compliance reports. Recommend improvements as necessary to safeguard and reduce risks to the organization’s networks.

 *Contingent on Contract Award*

Qualifications

Basic Qualification:

  • U.S. Citizen
  • An active SECRET or the ability to obtain a SECRET Clearance.
  • Bachelor’s degree with 5 – 7 years, master’s degree with 3 - 5 years, or PhD with 0 – 2 years; four (4) years of experience can be substituted in lieu of a bachelor’s degree.
  • Ability to work independently and take initiative to do what is needed to achieve learning goals.
  • Demonstrates ability to communicate with individuals at many different levels from within and from outside of the organization.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$66,000 - $106,000. This represents the typical salary range for this position based on experience and other factors.
Apply now Apply later
  • Share this job via
  • or

Tags: Clearance Compliance FISMA Monitoring NIST NIST 800-53 Oracle PhD RSA SLAs

Region: North America
Country: United States
Job stats:  3  0  0
Category: Admin Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.