Linux System Administrator with Security Clearance Law Enforcement & Security - Montgomery, AL at Geebo

Linux System Administrator with Security Clearance

R-00126429 Description Leidos is currently seeking an Linux System Administrator in support of the AFINC II contract for the highly visible 26th Network Operations Squadron (26 NOS) at Montgomery, Alabama, which provides a world-wide support missionThe 26 NOS is responsible for the intranet support of the entire Air Force networkThe mission of the 26 NOS is to operate and defend the Air Force (AF) Enterprise computer network consisting of the AF Wide Area Network (WAN) routers, AF Network Increment 1 (AFNET Inc 1) Gateways, and the 26 NOS Local Area Network (LAN) assetsPrimary Responsibilitieso Serve as Linux junior or mid-level systems administrator working within a team reporting to SME/Senior Linux team members operating in a 24x7 multi-enterprise networks environmento Provide support for mission critical applications; Monitor, troubleshoot, and analyze overall health of Red Hat Enterprise Linux infrastructure (RHEL) and/or other Unix-based OSo Manage, open, and remediate tickets (incident, problem, change, service requests, etc.
) in accordance with 26 NOS policies and any Service Level Agreements (SLAs)This encompasses any ticketing system used to record tickets utilized by 26 NOS personnel in support of mission requirementso Monitor, troubleshoot, and resolve hardware, software or network issues; coordinate with vendors for providing feedback and/or conducting break-fix actions or replacement of server hardware itemso Monitor all activities of the network facilities and ensure high system availabilityo Maintain, update, develop and sustain technical documents, analyses, and reportso Provide technical support in all customer interaction situations, including receipt of specifications, design, test, and response to service requests.
o Perform root cause analysis, recommend, and implement tactical and strategic solutions to problemso Ability to utilize remote access out-of-band management tools such as Red Hat Satellite, SSH, SCP, integrated Dell Remote Access (iDRAC), integrated Lights-Out (iLO), or KVM technologieso Ability to support 3rd party applications (NetBackup, ESS) and the implementation of Linux based security solutions across a variety of networks on physical and virtual environmentso Familiarity with general networking topics such as SSL, load balancing, routing protocols, firewall rules, and ability to support/interact with McAfee Endpoint Security System (ESS) for RHELo Ability to maintain valid system certificates, application certificates, F5 load balancing local traffic management (LTM) and two-factor authentication (2FA) within a smart card environmento Preferred experience utilizing vendor best practices for RHEL systems and secure management across multiple unclassified and classified network locations supporting Tenable products within Assured Compliance Assessment Solution (ACAS) including.
SC (SecurityCenter) and Nessus Scannero Ability or experience in evaluating scan report data from Tenable Nessus; participate in the audit, review and response phases of the Vulnerability Management (VM) life cycleo Install and patch operating systems, applications, and document Department Information Systems Agency (DISA) Security Technical Implementation Guidelines (STIGs) checklists applicable to each Non-classified or Secret Internet Protocol (IP) Router Network (NIPRNet, SIPRNet)o Monitor, implement and/or create report dashboard designs, automated custom email report notifications, report log data repositories for each environment specific to the following audiences:
Leadership & Executives; Cybersecurity Staff; and System Administratorso Ensure networks receive periodic updates from AFCYBER-released software patches, updates, and upgrades via Time Compliance Technical Orders (TCTO), Time Compliance Network Orders (TCNO), Maintenance Tasking Order (MTO) and Notices to Airman (NOTAMs)o Ensures external networks receive inventory data for compliance data DoD Enterprise Logging Ingest, NiFi, and Cyber Situational Awareness Refinery (ELICSAR) Big Data Platform (BDP) Basic Qualificationso 1 to 4 years hands-on experienceo Prefer RHEL experience implementation or administration in a large-scale environment preferably overseeing daily, weekly, monthly functions and best practiceso Prefer candidate with 2
years of years of hands-on experience in Linux-based systems support with experience in mid-to-large data center environments and patch/update managemento Demonstrated advanced diagnostics, analytical, troubleshooting skillso Preferred system hardening experienceo Preferred experience with physical servers and in virtualized environments such as VMware vSphere's vCenter Server Appliance, ESXi hosts, virtual machines (VMs), deploying templates, host bus adapters (HBA) fiber connectivity, and/or VM/Host distributed resource schedules (DRS) groups/ruleso Ability or experience with Linux based scripting such as:
Ansible, Bash, Bourne, Perl, or Pythono Knowledge of data communications, local-area networking (LAN), wide-area networking (WAN), servers, routers, switches, and firewallso Network (Layer 2, 3) LAN/WAN knowledge and switches/routerso Thorough understanding of Internet Protocol (IP) routing, switching, and OSI modelo Ability to lift, rack and provision government furnished equipment (GFE) serverso Technical degree, Associates or, Bachelor's degree in Computer Science/Information Systems, S.
T.
E.
Mor 2-4 years' relevant experience in Information Technology preferably within systems or applications administration is acceptableo Required IA Certification:
CompTIA Security
CE (Continuing Education) or GIAC Global Industrial Cyber Security Professional (GICSP) or (ISC) SSCP - Systems Security Certified Practitionero One or more of the following CE/OS based technical certifications required:
CompTIA Linux
or Red Hat Certified System Administrator (RHCSA) or Linux Foundation Certified System Administrator (LFCS) or Linux Professional Institute LPIC-1, LPIC-2 or LPIC-3o Active Secret government security clearance requiredPreferred Qualificationso Possess refined critical thinking skills, should be a motivated self-starter, and multi-task capableo Good communication and interpersonal skills; Ability to follow policies and procedureso Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questionso Aptitude to address negative situations and resolve them in a positive mannero Approach work tasks as diplomatic, adaptive to a dynamic environment, dependable and reliableo ITIL certification a pluso Splunk Core Certified User or Splunk Core Certified Power User Pay Range:
Pay Range $55,250.
00 - $99,875.
00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salaryAdditional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other lawOriginal Posting Date:
01/11/2024 While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Recommended Skills Windows Powershell Linux Windows Servers Virtualization Active Directory Windows Server 2008 Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3p7l676fthyvwz66dy', 'ExternalApply-j3p7l676fthyvwz66dy'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.