|Title:||Systems Admin LVL's I and II|
8-koi is currently pursuing an opportunity that would support NAWCTSD in the Acquisition and Management of Navy Training Services, in Orlando, FL. This contract will provide support to overarching programs including; Aviation Platforms, Sea Platforms, Undersea Platforms, Schools, Research as well as other programs that fall under NAWCTSD Program Directorates or Competencies.
We are currently targeting an award date in late 2019 with Contract Transition to begin in early 2020. As is typical in the Government Contracts Arena, Incumbent (current) employees that fit the skill set and compensation metrics, with a successful performance record will be given first right of refusal to retain employment on this contract while new applicants will be considered for all position on an as needed basis.
Please review all opportunities that are listed and apply to any/all positions that match your skill set. For further information or any questions please reach out to firstname.lastname@example.org.
Network and Computer System Administration LVL I and II
LVL I employees will assist LVL II employees in the below areas
The successful team will provide network and computer system administration efforts as follows:
a. Operate and maintain networks, servers, and client workstations.
b. Install configure, maintain, and administer networks, network devices, client machines, and servers.
c. Implement and support application packages.
d. Procure and repair components necessary to maintain network and information technology systems
e. Conduct systems analysis and summarize the data collected in a technical document that is understood and usable by the decision makers.
f. Maintain system backups.
g. Recognize/Examine a potential security violation IAW SECNAVINST 5239.19, take appropriate action to report the incident as required by regulation, and mitigate any adverse impact and preserve evidence.
h. Apply instructions and pre-established guidelines IAW DoDI 8500.01 and DoDI 8510.01 to perform information security tasks within the network and computer systems.
i. Perform Cybersecurity related customer support functions including installation, configuration, troubleshooting, customer assistance, and/or training, in response to customer requirements for the network and computer systems.
j. Analyze patterns of noncompliance and take appropriate administrative or programmatic actions to minimize security risks and insider threats.
k. Manage accounts, network rights, and access to network and computer systems and equipment.
l. Analyze system performance for potential security problems.
m. Assess the performance of security controls within the network and computer systems.
n. Identify network and computer systems vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing.
o. Configure, optimize, and test network servers, hubs, routers, and switches to ensure they comply with security policy, procedures, and technical requirements.
p. Install, test, maintain, and upgrade network operating systems software and hardware to comply with cybersecurity requirements.
q. Evaluate potential cybersecurity risks and take appropriate corrective and recovery action.
r. Ensure that hardware, software, data, and facility resources are archived, sanitized, or disposed of in a manner consistent with system security plans and requirements.
s. Diagnose and resolve cybersecurity problems in response to customer reported incidents.
t. Research, evaluate, and provide feedback on problematic cybersecurity trends and patterns in customer support requirements.
u. Perform system audits to assess security related factors within the network and computer systems.
v. Install perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc., and enhance rule sets to block sources of malicious traffic.
w. Work with other privileged users to jointly solve cybersecurity problems.
x. Apply security requirements to operating systems within network and computer systems.
y. Adhere to IS security laws and regulations to support functional operations for network and computer systems.
z. Implement response actions in reaction to security incidents.
aa. Provide end user information security support for computer environment systems, peripherals, and applications.
bb. Support, monitor, test, and troubleshoot hardware and software cybersecurity problems pertaining to network and computer systems.
cc. Apply network and computer systems specific information security program requirements to identify areas of weakness.
dd. Install and operate the Network and computer systems in a test configuration manner that does not alter the program code or compromise security safeguards.
ee. Conduct tests of information security safeguards for network and computer systems in accordance with implementation plans and SOPs.
ff. Apply established information security procedures and safeguards and comply with assigned responsibilities IAW SECNAV M-5239.3C.
gg. Develop and implement access control lists on switches and other network devices.
hh. Comply with system termination procedures and incident reporting requirements related to potential network and computer systems security incidents or actual breaches.
ii. Implement applicable patches including IAVAs and security alerts for the network and computer systems commercial-off-the-shelf (COTS) IT products.
jj. Understand and implement technical vulnerability corrections (i.e. workarounds, mitigations and/or remediation)
kk. Assist System Security Officer/Manager in coordinating and executing RMF Assess and Authorize (A&A) activities for the network and computer systems.
ll. Perform penetration tests and vulnerability assessments using DoD vulnerability assessment tools; ACAS, SCAP, STIG Viewer periodically to test and maintain the network and computer systems security posture.
mm. Ensure compliance with Department of the Navy Application & Database Management System (DADMS) validation requirements for commercial of the shelf (COTS) and government of the shelf (GOTS) software products used in the network and computer systems. Request a government sponsored DADMS access account.
8-Koi and, its wholly owned subsidiary, CDE are Equal Opportunity Employers. 8-Koi and CDE do not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit, and business need.