Skills
- Linux
- Unix
- network management
- Systems Administrator
Job Description
About the role
The successful applicant will join an existing Cybersecurity team as a systems administrator, with
focus on network, cloud, and telecommunications security. The position consists of working closely
with end users, system administrators, network engineers, and application developers to architect,
adapt and implement security systems and controls. The position will be involved in providing
technical support and guidance, test execution, monitoring, problem diagnostics, and cyber event
management.
Physical Requirements
Sedentary work; exerting up to 30 pounds of force occasionally, and/or a negligible amount of
force frequently to lift, carry, push, pull, or otherwise move objects, including the human body.
Sedentary work involves sitting most of the time in normal office conditions, but does involve
walking or standing outside periodically for inspections, customer calls, etc. Work requires no
unusual physical demands. Physical demands for a specific position within this classification may
vary and / or exceed those demands described above.
Minimum Requirements
Experience with server hardware and operating systems (Windows, Linux, and/or Unix)
Experience with networking, including TCP/IP, DNS, DHCP, and routing
Experience with network protocols, including HTTP, SSL, and IPSec
Has or is working towards gaining CompTIA Network+, Security+, or other IT-related
certifications
Self-motivated with ability to lead and work independently to complete projects
High School Diploma or Equivalent
Valid driver's license
Preferred Requirements
Proficiency in networking technologies, network security and network monitoring
solutions
Knowledge of IP network management, subnetting, routing, and network access control
Security certification (GIAC, CISSP, SSCP, CCFP or others)
3+ years of combined experience in Information Security or related Information
Technology position
Knowledge of operating system, database, and application security configuration
Knowledge of security systems including anti-virus and EDR applications, content
filtering, network and application firewalls, authentication systems, and intrusion
detection
About the Selection Process
Phase 1 - Submit online application at ;br />Phase 2 - Experience, training, and education evaluation
Phase 3 - Interview with department representatives
Phase 4 - Written, performance, and behavioral exercises
Phase 5 - Background investigation
Phase 6 - Physical assessment and/or drug screen