System Administrator (Level 4) jobs in United States
info-icon
This job has closed.
company-logo

Kaizen Approach, Inc. · 1 month ago

System Administrator (Level 4)

Kaizen Approach is currently seeking a Systems Administrator to provide implementation, troubleshooting, and maintenance support for complex Information Technology (IT) systems within a secure government environment. The role involves managing IT system infrastructure and overseeing processes that ensure optimal performance and reliability across various systems while providing tiered support for problem identification and resolution.

Cyber SecurityInformation TechnologyIT Management
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Provide implementation, troubleshooting, and maintenance support for complex Information Technology (IT) systems within a secure government environment
Manage IT system infrastructure and oversee processes that ensure optimal performance and reliability across client, server, storage, network, and mobile systems
Provide Tier 1 through Tier 3 support for problem identification, diagnosis, and resolution while coordinating escalation activities and communicating status updates to agency management and internal customers
Configure and manage UNIX, Linux, and Windows operating systems, install and maintain software, and implement enhancements to improve system performance
Troubleshoot and maintain network components, ensuring operational integrity and seamless integration across all platforms
Provide comprehensive support for the implementation, troubleshooting, and maintenance of IT systems, including managing daily configuration and operations, and supporting system design, mission architecture, and associated hardware
Perform Tier 1, Tier 2, and Tier 3 problem identification, diagnosis, and resolution while assisting users in accessing and using IT systems and providing detailed analysis and feedback to agency management for escalated issues
Perform account management functions such as establishing, activating, modifying, disabling, and removing accounts while ensuring IT assets remain compliant with Identity and Access Control Management (ICAM) policies
Provide configuration management, implement and sustain compliance with system security controls, perform periodic vulnerability scans, and apply IAVA security patches with accurate documentation in the appropriate systems of record
Configure and manage UNIX, Linux, and Windows (or other applicable) operating systems, install and load operating system software, troubleshoot and maintain system integrity, configure network components, and implement enhancements to improve performance and reliability
Optimize system operations, perform capacity analysis and planning, apply knowledge of mission islands, Trusted Thin Client, and enhanced VDI (e.g., remote GPU and memory scaling), and understand system administration interdependencies within Service Oriented Architecture (SOA)
Communicate and coordinate with the Information System Security Officer (ISSO) and Information System Owner (ISO) regarding system changes under Change and Configuration Management processes, support POA&M milestone completion, and analyze and resolve complex problems involving server hardware, software, and application integration

Qualification

UNIXLinuxWindowsITIL 4 certificationDoD 8570 complianceActive DirectoryIdentity ManagementSCCMDNSGroup PolicyPrivileged Account ManagementCapacity analysisCommunicationProblem-solvingTeam collaboration

Required

Must have the ability to provide comprehensive support for the implementation, troubleshooting, and maintenance of IT systems, including managing daily configuration and operations, and supporting system design, mission architecture, and associated hardware
Must possess the ability to perform Tier 1, Tier 2, and Tier 3 problem identification, diagnosis, and resolution while assisting users in accessing and using IT systems and providing detailed analysis and feedback to agency management for escalated issues
Must be capable of performing account management functions such as establishing, activating, modifying, disabling, and removing accounts while ensuring IT assets remain compliant with Identity and Access Control Management (ICAM) policies
Must have the ability to provide configuration management, implement and sustain compliance with system security controls, perform periodic vulnerability scans, and apply IAVA security patches with accurate documentation in the appropriate systems of record
Must possess the ability to configure and manage UNIX, Linux, and Windows (or other applicable) operating systems, install and load operating system software, troubleshoot and maintain system integrity, configure network components, and implement enhancements to improve performance and reliability
Must be capable of optimizing system operations, performing capacity analysis and planning, applying knowledge of mission islands, Trusted Thin Client, and enhanced VDI (e.g., remote GPU and memory scaling), and understanding system administration interdependencies within Service Oriented Architecture (SOA)
Must have the ability to communicate and coordinate with the Information System Security Officer (ISSO) and Information System Owner (ISO) regarding system changes under Change and Configuration Management processes, support POA&M milestone completion, and analyze and resolve complex problems involving server hardware, software, and application integration
Must have a minimum of twenty (20) years of experience as a System Administrator (SA) on programs and contracts of similar scope, type, and complexity, including at least eight (8) years of experience with Service Management (ITSM); must also possess DoD 8570 compliance with Information Assurance Technical (IAT) Level III certification, a Computing Environment (CE) certification such as Microsoft OS or CentOS/Red Hat OS, and an ITIL 4 platform certification; if assigned to Directory Services TTOs, experience with Active Directory, Identity Management, SCCM, DNS, Group Policy, Active Role Servers, Privileged Account Management (PAM) Services, and MS Exchange is required; if assigned to Desktop & Enclave Services TTOs, understanding of mission islands, Trusted Thin Client, and enhanced VDI (e.g., remote GPU and memory scaling) is required
Must have a bachelor's degree in a technical discipline from an accredited college or university, or a total of twenty-four (24) years of relevant SA experience if a degree is not held
Active TS/SCI clearance with polygraph is required

Benefits

Premium healthcare
Financial and family support
Retirement planning
Ongoing learning
4 weeks of PTO
11 holidays
Gifted 401k
Profit sharing
Paid training

Company

Kaizen Approach, Inc.

twittertwittertwitter
company-logo
We are guided by the Japanese philosophy of kaizen, often translated as “to become good through change.” Our role is to apply this concept of ongoing improvement to two of the most significant factors in the success of an organization today: the strength of its cybersecurity and the professional development of its employees.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Al Pickering
CEO
linkedin
leader-logo
Melissa McCoy
Chief Technology Officer
linkedin
Company data provided by crunchbase