Systems Administrator - FAC Information Technology (IT) - Lexington, MA at Geebo

Systems Administrator - FAC

Security Services

The Security Services Department's overall mission is to ensure a safe and secure environment and protect MIT Lincoln Laboratory at all facilities in which staff members perform their mission of research and development.
To accomplish this mission, this department formulates and implements policies, plans, and actions designed to protect facilities against threats of vandalism, accidental destruction, and sabotage; and safeguards personnel, classified and unclassified information systems, personal identifiable information, property, and other assets from exploitation and recruitment by foreign intelligence agencies.

Job Description

Systems Administrator (SA) IT IC Level 4 (Forensic Analysis Center)

The Systems Administrator (SA) IT IC Level 4 (Forensic Analysis Center) is responsible for the effective provisioning, installation/configuration, operation, and maintenance of information systems (IS) hardware and software and related infrastructure.
This position also requires the candidate to provide technical support associated with incident response and/or forensic analysis within the Forensic Analysis Center.
The SA works with the SSD security team to ensure that system hardware, operating systems, software systems, and related procedures are compliant with Security Services Department policies and applicable Sponsor policies.
The candidate will work closely with FAC Analysts and IT members at the Laboratory to deliver high-quality, customer-focused solutions and support services that provide substantial value to the business.
The candidate will assist in supporting library documentation of system hardware and software.
A moderate degree of flexibility of schedule is required as some work may be done outside of major production hours during pre-scheduled maintenance windows or incident response activities.
The candidate must proactively monitor key server metrics to assure uptime, configure, update and maintain forensic hardware and software applications of networked and stand-alone systems.

The successful candidate may be required to work independently and/or as a team member.
Candidate must be a quick learner, self-motivated, reliable, and able to balance multiple tasks simultaneously.
Candidate must have strong interpersonal skills and be able to manage stress in a professional manger.
Knowledge of installation, integration, and optimization of system components; knowledge of server and client operating systems, Knowledge of virtualization technologies and virtual machine development and maintenance, and knowledge of system/server diagnostic tools and fault identification techniques.
Ability to monitor measures or indicators of system performance and availability and the ability to identify incidents, problems, and events that could negatively affect security and/or system performance.

Job Description (cont.
)

Candidate must have the ability to apply network security concepts including topology, protocols, components, and principles (e.
g.
, application of defense-in-depth).
Skill in monitoring and optimizing system/server performance and skill in operating system administration.
(e.
g.
, account maintenance, data backups, maintain system performance, install and configure new hardware/software).

Candidate must be knowledgeable in computer security principles and policies, to include, Security Technical Implementation Guides (STIGs), National Industrial Security Program Operating Manual (NISPOM), NIST 800-53 / Risk Management Framework (RMF), NIST SP 800-171.
Candidate must have strong technical skills and be able to respond to off-hours emergencies.
Position may require occasional local and overnight travel.

Core Responsibilities

  • Monitor and maintain system/server configuration.
  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Maintain, update and test forensic software on forensic systems to insure that the FAC is consistently relying on the most up-to-date software and procedures.
  • Maintain vendor relationships for FAC hardware and software.
    Ensure that all software and hardware is licensed and continually supported by the vendor.
    Manage software and hardware requisition processes.
  • Support classified forensic system(s) through auditing, software updates, hardware maintenance, and backups.
  • Diagnose and perform repairs on faulty system/server hardware.
  • Install, update, and troubleshoot systems/servers.
  • Develop and document systems administration standard operating procedures.

Core Responsibilities (cont.
)

  • Plan, execute, and verify data redundancy and system recovery procedures.
  • Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.
  • Provide ongoing optimization and problem-solving support.
  • Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Maintain database management systems software.
  • Maintain directory replication services that enable information to replicate automatically from rear servers to forward units via optimized routing.
  • Perform backup and recovery of databases to ensure data integrity.
  • Provide recommendations on new database technologies and architectures.
  • Install and configure database management systems and software.

Core Responsibilities (cont.
)

  • Prepare digital media for imaging by ensuring data integrity (e.
    g.
    , write blockers in accordance with standard operating procedures).
  • Extract data using data carving techniques (e.
    g.
    , Forensic Tool Kit FTK , Foremost, Encase etc.
    ).
  • Use specialized equipment, tools, applications, and techniques to catalog, document, extract, collect, package, and preserve digital evidence.
  • Create a forensically sound duplicate of the evidence (i.
    e.
    , forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes.
    This includes, but is not limited to, hard drives, floppy diskettes, CDs, PDAs, mobile phones, GPS, and all tape formats.
  • Conduct network, system, and application vulnerability scanning, configuration assessment, and remediation.
  • Assist with the maintenance of the FAC budget, projecting for software and hardware maintenance costs.
  • Document FAC processes and procedures; support triage and tracking of case information and media.
  • Serve as a member of the Laboratory Computer Security Incident Response Team.

Requirements

  • BS degree in Computer Science, Computer Engineering, Information Technology, Computer Information Systems, or related discipline is required
  • A minimum of 6 years of IT security experience in DoD Information Security is required
  • Possess a DoD 8570.
    01-M Information Assurance Technical Level II (IAT III) baseline certification (e.
    g.
    CCNP Security, CASP
    CE, CISSP, CISA, GCED, or GCIH) or be able to obtain one within 6 months of hire
  • Technical experience, skills, and course work completed towards a Graduate Degree, or industry IT certifications may be considered in lieu of DoD security experience requirements
  • Demonstrated understanding of the following security frameworks is required:
    • NIST 800-53 / Risk Management Framework (RMF)
    • National Institute of Standard and Technology Special Publication 800-160 Vol 2, Developing Cyber Resilient Systems and Organizations
    • NIST SP 800-171

Requirements (cont.
)

  • Experience and familiarity with multiple operating systems such as Windows Server, Red Hat Enterprise Linux, Ubuntu, Mac, etc.
  • Experience maintaining directory services.
    (e.
    g.
    , Microsoft Active Directory, LDAP, etc.
    ).
  • Skill in using virtual machines.
    (e.
    g.
    , Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.
    ).
  • Experience in database administration a plus
  • Technical experience securing networks and systems utilizing DISA STIGs and/or SRGs is highly desired
  • Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Top Secret level DoD security clearance

For Benefits Information, click http:
//hrweb.
mit.
edu/benefits

Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.

MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer.
All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.
S.
citizenship is required.

Requisition ID:
33106 #CJ

.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.