Tucson, AZ, 85702, USA
4 days ago
Secret - Linux Systems Admin
Job Description -We are seeking a Secret cleared Linux Systems Administrator with GCCS experience to support a mission in Tucson AZ. GCCS manages the assets (e.g., software and licenses, servers, disk subsystems and SAN storage, virtual machines, personal computers, peripheral devices, and so forth) required during peacetime, wartime, and military exercises. The ideal candidate will be able to provide C4 IT support, including installation, upgrade, and administration of hardware and software; resolution of interoperability issues for mission systems/ equipment. They will provide technical service support using in-depth knowledge of software/hardware configuration, system administration of computers using LINUX/Windows operating systems, network services and components, network management tools, Hyper-V Virtualization tools, and system security. Responsibilities -Provide on-site GCCS and DCO system engineering support as required to maintain the system in an operational state at all times (e.g. 24/7 access to user’s personal and office shared data, maintaining terminal service). -Provide technical support for GCCS and DCO systems (equipment/applications) during the product life cycle and technical support for mission applications (e.g. monitoring domain and Domain Name System (DNS) replication). -Provide support with daily operations and maintenance of GCCS and DCO systems, to include end-user application support. -Perform technical refreshes and upgrades/patches to the systems, perform backups, monitor the system performance, troubleshoot problems, and provide technical direction for the future. Shall be performed daily with weekly reports provided to COR. -Scan systems for network vulnerabilities and mitigate identified vulnerabilities. Weekly/monthly reports will be generated to show the overall health of supported systems by listing the number of vulnerabilities mitigated/unresolved. Scans shall be performed in accordance with (IAW) local policy. Scans are typically performed weekly; however, the COR may request ad-hoc scans and reports. -Support by adhering to standard procedures, Security Technical Implementation Guides (STIGs), Cyber Technical Orders (CTOs), and Maintenance Task Orders (MTOs) to include using best practices and lessons learned (avoiding common pitfalls) to ensure supported systems are network worthy and not vulnerable. -Maintain and examine system/audit logs for failures, failure prediction, and Information Assurance (IA) accountability requirements for C2 Systems. System logs and status reports shall be provided to COR upon request (typically in conjunction with government audit). -Perform basic database maintenance IAW a COR approved maintenance plan and schedule. Initial and reoccurring maintenance plans shall be provided to COR for approval before implementation (For example: out of cycle scheduled maintenance). -Create, manage, schedule, and test backups of systems based on COR defined plan for C2 Systems. Backup plan is generated by the contractor to the COR for approval/implementation. -Perform database recovery, loading new databases, reinitializing and reloading databases upon installation of new software version releases. -Perform database and applications server performance monitoring; database storage allocation; database and server distribution monitoring; maintaining database configuration. -Provide a continuity of corporate technical knowledge of the full array of installed and support equipment used at operational locations. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/. Skills and Requirements -Active DoD Secret Clearance. -DoD 8570.01-IAT Level II certification -4+ years of experience providing information systems administration support. -Bachelor’s degree from an accredited institution in a related engineering, computer science, information systems, or technical field. OR related certifications (e.g. CompTIA Network+ or Cisco Certified Network Professional) can be substituted for the Bachelor’s Degree. -Demonstrated proficiency maintaining and configuring the following systems and platforms: Red Hat Enterprise Linux, Microsoft suite of tools, Microsoft OS (i.e. Server 2019 and any subsequent version), Active Directory Group Policy administration, System Center Configuration Manager (SCCM) or Microsoft Endpoint Configuration Manager (MECM), WSUS, SMS, NIS+, ACAS, VMWare, NetApp, SPLUNK and Red Hat. -Demonstrated proficiency maintaining and configuring the following server environments and functions: Active Directory, Domain Controller, Domain Name Server and Backup Exec. -PowerShell tool Scripting -Firewall, Router, Switches, VLAN, TACLANE, IAVA Patching/Upgrade, Documentation and SOP. Continuity of Operation (Hot, Warm, Cold sites) -Demonstrated expertise with System Engineering and development IAW PWS 4.2. -Experience with Red Hat Enterprise Linux
Confirmar seu email: Enviar Email