Posted: Wednesday, December 13, 2017 9:28 PM
Manages the functionality and efficiency of a group of computers running on one or more operating systems. 1. Manages the functionality and efficiency of a group of computers running on one or more operating systems. 2. Maintains the integrity and security of servers and systems. 3. Sets up administrator and service accounts. 4. Maintains system documentation 5. Interacts with users and evaluates vendor products. 6. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. 7. Develops and monitors policies and standards for allocation related to the use of computing resources. 8. May program in an administrative language. 9. Develops and implements testing strategies and document results. 10. Provides advice and training to end-users. 11. Provides guidance and work leadership to less-experienced staff members. 12. Maintains current knowledge of relevant technologies as assigned. 13. Participates in special projects as required. Duties:- Administer, manage, operate, maintain, install and configure 690 COG AOR network boundary devices and technologies.- Working with Communications Squadrons and other base-level authorities to maintain and administer security boundary components at locations IAW DoD and AF standards and guidance, using industry best practices- Changing, upgrading, and patching boundary devices requiring two-person compliance through established change management procedures- Participating in project management, planning, implementation and installation to ensure configuration and integration conforms to baseline architecture- Identifying potential threats- Managing resolution of security violations- Maintaining and operating Intrusion Prevention Systems (IPS)- Troubleshooting and correcting IPS induced service issues- Maintaining physical infrastructure to include troubleshooting and operating system patching- Granting and restricting administrative access to boundary devices according to authorization rules- Working with communication units to maintain and administer security boundary components at locations IAW DoD and AF standards and guidance- Identifying potential threats and managing resolution of security violations- Monitoring and troubleshooting intrusion prevention boundary devices using Government provided toolsets (such as SCOM, SolarWinds, SMARTS and NETCOP/NETCOOL)- Monitoring network boundaries to provide intrusion detection, identification, and internal/external IT threat analysis- Preserving, protecting, recovering and reconstituting friendly cyberspace capabilities before, during and after network attacks- Making changes/upgrades/patches to boundary devices requiring two-person compliance through established change management procedures- Responding to and accomplishing change request actions and documenting changes, upgrades, patches- Responding to outages and resolving and documenting priority incident tickets- Accomplishing network maintenance during the Government-prescribed maintenance windows- Troubleshooting web connectivity problems- Granting and restricting administrative access to boundary devices according to authorization rules- Installing, configuring, operating, maintaining, monitoring, administering, and troubleshooting of network and network defense technologies (eg, firewalls, application-based firewalls, intrusion detection systems, web proxy devices and servers, and associated software)- Participating in project management, planning, implementation and installation to ensure configuration and integration conforms to baseline architecture- Making changes, upgrades, and patches to boundary devices requiring two-person compliance through established change management procedures Please Note: Shift work is possible. EducationBachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience.Qualifications5-8 years of directly related experience in systems administration and analysis. Requirements:- Current 8570 IAT II Level Certification (CNA-Security, GICSP, GSEC, Sec+ CE, SSCP) or higher- Experience working with Palo Alto Firewalls and/or Blue Coat Proxies Desired Experience/Certifications:- Blue Coat Certified Professional- Certified Infoblox Core Administrator (CICA)- Red Hat Certified System Administrator (RHCSA)- Blue Coat Certified Administrator - CompTIA Linux+ - Palo Alto Accredited Configuration Engineer (ACE) - SolarWinds Certified Professional- Wireshark Certified Network Analyst (WCNA) As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.
• Location: Hampton
• Post ID: 32396422 hampton