System Administrator 3
Location: Vancouver, WA (On-Site)
Duration: 12-month Contract (with possible extensions up to 5 years)
The role of the System Administrator is to provide operating system support in order to provide sustainable, stable and secure enterprise level servers including backup recovery, performance tuning, upgrades/patches, maintenance, troubleshooting, permissions and file sharing. The System Administrator installs, configures, and supports management approved local area network (LAN), wide area network (WAN), and Internet systems or a segment of a network system. This role monitors the network to verify network availability to all system users and may perform necessary maintenance to support network availability.
Position Responsibilities:
Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations.
Perform data backups and disaster recovery operations.
Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
Configure, monitor, and maintain email applications or virus protection software.
Operate master consoles to monitor the performance of computer systems and networks, and to coordinate computer network access and use.
Load computer tapes and disks, and install software and printer paper or forms.
Design, configure, and test computer hardware, networking software and operating system software.
Monitor network performance to determine whether adjustments need to be made, and to determine where changes will need to be made in the future.
Confer with network users about how to solve existing system problems.
Monitor and test Web site performance to verify Web sites operate correctly and without interruption.
May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software.
Administer network security measures.
Implement and integrate new system architecture into an existing environment
Deploy highly available technologies such as replication, load balancing, geographic clustering
Install and configure server hardware including operating system and additional software to configure for optimal use.
Identify standard monitoring requirements and scripting or applying additional setting requirements.
Troubleshoot hardware and system level problems.
Interpret architecture and design configurations from vendors or other teams to enable clear implementation standards and guidelines.
Document implementation guidelines and installation guidance.
Position Requirements:
Education & Corresponding Experience
A degree in Computer Science, Information Technology, or a directly related technical discipline is preferred.
8 years of experience is required with an applicable associate or bachelor's degree .
10 years of experience is required without a degree or applicable degree or with no degree .
Experience includes a minimum combination of work-related experience, on-the-job training, and/or vocational training. Experience should be consistent with the specific requirements of Computer/Information Technology or related field, and progressively more technical in nature
Required Technical Skills & Experience
2 years of experience with the following:
Classes of vulnerabilities, appropriate remediation, and industry standard classification schemes (CVE, CVSS, CPE).
Linux and Windows operating systems, including common programming or scripting languages.
Devising methods to automate testing activities and streamline testing processes.
Knowledge of patching programs of major hardware/software manufacturers. Knowledge of secure configuration and hardening of systems.
Knowledge of methods for on-going evaluation of the effectiveness and applicability of information security controls (e.g., vulnerability testing, and assessment tools).
Knowledge of security vulnerabilities, application analysis, and protocol analysis.
Knowledge of network topology, communication protocols, firewalls, proxies, and IDS systems to affectively configure scanning software.
Preferred Skills & Experience
Experience setting up and administering an enterprise cyber vulnerability scanning and assessment infrastructure.
Experience administering computer systems in a 24/7 high availability operational environment.
Experience using specific technologies such as Splunk.
Experience administering Tenable.sc and Nessus.