Apex Systems is seeking a Linux Systems Admin to support one of our Government Integration clients in Aberdeen, MD.
Title: Linux Systems Admin
Location: Aberdeen, MD
Contract: Long term
Pay: $45-$55/hr.
Clearance: Active Secret, will upgrade to TS
Cert: (2) certification requirements from: SEC+, CEH, CySA+ (This one would cover both certs), GICSP, SSCP, CHFI, CFR, Cloud+, CND
Education/Experience: Bachelors & 4-8 years of prior relevant experience; or Masters with 2-6 years of prior relevant experience
Primary Responsibilities
Supports change and control boards and provide installation, configuration, engineering, administration, and accreditation documents/diagrams for the infrastructure life cycle replacements upgrades, enhancements, and new technology deployments
Supports design, installs, maintenance and coordination of the use of network systems.
Supports training of users, maintains, creates and deletes user accounts.
Supports key project/program objectives and deliverables.
Coordinate with Operations and Engineering, providing technical support for Linux devices supporting the security monitoring of networks
Supports creation of infrastructure and rack elevation diagrams
Supports maintenance Information Assurance Vulnerability Management (IAVM) compliance on all security devices
Supports development of Plan of Action and Milestones (POA&M)
Monitor, organize and work collaboratively in a technological environment to support an established collaborative work environment
Support and sometimes lead systems engineering efforts for new system development efforts or critical system enhancements and patches engineering and configuration management processes
Actively mentor junior system administrator personnel and reinforce adoption of best practices
Supports development of functional requirements through interaction with end-users and coordinates with support teams on systematic enhancements or changes
Promotes research and implementation of automation and process efficiencies
Basic Qualifications
Strong command line linux (preferably Red Hat)
Basic scripting skills
Familiarity with VMWare/vCenter
General knowledge of IP networking
Ability to problem solve and work independently.
Desire to learn new technologies and cyber skills.
Knowledge of computer security principles and DoD security protocols
Knowledge of security policies and general vulnerabilities management
Experience and familiarity with change control processes
Ability to support creation of network topology and rack elevation diagrams.
Candidate must possess an active Secret clearance with ability to upgrade to TS/SCI eligibility or TS/SCI preferred.
Must hold DoD 8570 IAT-II (Security +) prior to start date and CSSP-Infrastructure Support certification within 3 months of start.
Must hold Computing Environment Certification prior to start date.
Preferred Qualifications
Comfortable scripting or writing code in Python, bash, PowerShell, or other popular and common language to perform daily tasks or configuration management.
Red Hat Enterprise Linux Certified Engineer certification
Understanding of network topologies, both transport and IP
Understanding of the ELK stack, Bro/Zeek
Technical understanding of core current cybersecurity technologies as well as emerging capabilities.
Demonstrated experience with researching and fielding new and innovative technology.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.
Excellent project, technical, interpersonal, presentation and problem management skills
Ability to communicate orally, and in writing, detailed technical information on troubleshooting and implementation efforts.
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
Technical understanding of core current cybersecurity technologies as well as emerging capabilities.