SOSi

Intermediate Systems Administrator (Active Directory)

Job Locations US-AZ-Fort Huachuca
Job Post Information* : Posted Date 5 months ago(3/16/2022 10:52 AM)
ID
2022-5724
Location : Location
US-AZ-Fort Huachuca
Potential for Remote
No
Clearance Requirement
Secret with T5
Job Requires Relocation
Yes
Job Requires Relocation
Yes

Overview

SOS International, LLC (SOSi) is currently seeking an Intermediate Systems Administrator (Active Directory) in Fort Huachuca, AZ. The Intermediate Active Directory Systems Administrator reports to the Active Directory Team Lead. The ideal candidate will possess experience in Active Directory/Security/Server Administration. 

Responsibilities

  • Be responsible for installing, configuring, and maintaining standardized operating system baselines specific to domain controllers and enterprise member servers, in support of business processing requirements.
  • Perform Active Directory domain, Active Directory sites and services, Domain Naming Service (DNS), and organizational unit administration per NETCOM guidelines and established internal processes.
  • Perform software installations and upgrades to operating systems and layered software packages.
  • Schedule installations, upgrades, and maintenance in accordance with established IT policies and procedures.
  • Monitor and tune the system to achieve optimum performance levels.
  • Ensure server data integrity by evaluating, implementing, and managing appropriate software and hardware solutions.
  • Ensure data/media recoverability by implementing a schedule of system backups and database archive operations.
  • Support media management through internal methods and procedures or through offsite storage and retrieval services.
  • Conduct routine hardware, software, and security audits of servers to ensure compliance with established standards, policies, and configuration guidelines.
  • Assist in development and maintenance of a comprehensive operating system hardware and software configuration database/library of all supporting documentation.
  • Support the Operations & Maintenance of the CONUS NIPR and SIPR forests which provide AD/DNS services to all CONUS Army users; this includes the security and monitoring of the Windows operating system, all NETCOM-approved software packages, and the EOL/EOS hardware that the domain controllers and member servers reside on.
  • Act as Tier III support for issues varying from any of the following:
    • (a) AD object restorations/deletions/moves, to include users and/or computers Group policy creation/permissioning/deletions;
    • (b) DHCP authorizations;
    • (c) Top-level Organizational Unit administrative rights permissioning and TLOU group management;
    • (d) Troubleshoot connectivity/authentication issues for NECs;
    • (e) Support for any number of issues encountered by NECs;
    • (f) CCRI inspections for all NECs that house AD/DNS servers; and
    • (g) Event log backups and archival to Gabriel Nimbus per ARCYBER requirements; and
    • (h) respond to weekly, monthly, and quarterly taskings from 7th and ARCYBER.
  • Support patching and system hardening through STIG application.
  • Develops, updates, and provides evidence for POAM maintenance and resolutions for all team controlled assets identified with an open security vulnerability requiring mitigation.
  • Assist in training and development of junior personnel.
  • Follow ITIL best practices to manage tickets and processes.
  • Develop and/or maintain SOPs, TTPs, and SmartBooks associated with current knowledge of relevant technologies as assigned.
  • Participate in special projects as required.
  • Collaborate with GTMs, Branch Chiefs, Division Chiefs and RCC-C Leadership.
  • Provide on-call support after business hours and during weekends when required.
  • Lead/manage high level administrative/technical taskings with senior level assistance, as required.

Qualifications

  • Active in scope SECRET w/T5 clearance or the ability to obtain Interim SECRET w/T5 eligibility
  • HS +8 years of experience or AA/AS +6 or BA/BS +4
  • An IAT II certification (CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP) is required
  • Be a positive, self-motivated, and proactive person with the ability to adapt to change and tolerate stressful situations
  • Candidate must communicate effectively with team members and team lead
  • Must have the ability and desire to research and develop creative solutions to unique problems with minimal supervision
  • Familiarity with Windows Active Directory services
  • Familiarity with Server 2012 R2 administration
  • Familiarity with physical (Dell, HP, IBM) and virtual (VMware/Hyper-V) servers
  • Knowledge of client/server hardware and software configuration
  • Familiarity with networking concepts
  • Familiarity with creating and/or modifying scripts (batch, PowerShell)
  • Familiarity with Microsoft System Center Operations Manager (SCOM)
  • Familiarity of Assured Compliance Assessment Solution (ACAS)
  • Familiarity of DISA STIGs and IAVAs
  • Familiarity of McAfee Host Based Security System (HBSS)

Preferred Qualifications

  • ITIL Foundation Certification
  • MCP 70-410 or other on CE list
  • Fluency in a foreign language is desirable, but not required

Working Conditions

  • Working conditions are normal for an office environment.
  • Fast paced, deadline-oriented environment.
  • May require periods of non-traditional working hours including consecutive nights or weekends (if applicable)

 

SOSi is an equal employment opportunity employer and affirmative action employer. All interested individuals will receive consideration and will not be discriminated against on the basis of race, color, religion, sex, national origin, disability, age, sexual orientation, gender identity, genetic information, or protected veteran status. SOSi takes affirmative action in support of its policy to advance diversity and inclusion of individuals who are minorities, women, protected veterans, and individuals with disabilities.


Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed