Peraton is seeking a Linux System Administrator with an Active Secret Clearance. Work will be 100% on-site in the King George/Dahlgren area supporting our Department of Defense (DoD) customer. No remote work or hybrid schedule.
As part of a highly talented, motivated and high performing team, you will support an exciting program which involves technical and operating of hardware and networks suites of equipment utilized in the development of software products. This support includes the establishment and maintenance of operating and network operating system development environments, and providing system and network design, implementation, maintenance, and network support. Join us and be part of the next generation of innovators as we blaze a trail forward in our industry and company.
What you will do:
• Support Cybersecurity related administration tasks, including system remediation, configuration, and development of A&A documentation.
• Provide system initialization, deployment, accreditation and system administration functions for all Unclassified & Classified development servers and workstations to include the following:
•Perform user accounts management.
• Perform Local Area Network (LAN) and application management support including switches, routers, firewalls, and loggers.
• Perform system backup management and restore systems in the event of system or disk crash. And perform system patching.
• Support Navy standards for A&A processes and procedures [e.g. Risk Management Framework (RMF), and Platform Information Technology (PIT)].
• Implement and validate Security Technical Implementation Guidelines (STIG) requirements, installation checklists, and other security process.
• Evaluates, tests, recommends, coordinates, monitors, and maintains information systems (IS) and cyber security policies, procedures, and systems, including access management for hardware, firmware, and software.
• Ensures that IS and cyber security plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS and cyber security.
• Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents and improve security.
• Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks, or leaks.
• Interacting with gov't senior leadership as well as other individuals across organizations.
• Any others tasks assigned by the gov't. customer.