Job Description
Key Responsibilities
System Architecture design (compute, hardware/virtual, OS, storage, networking, security)
Translate researcher IT needs into robust and scalable IT Solutions/Infrastructure
Contributor to the development of Continuous Integration and Continuous Development (CICD) processes using DevOps and DevSecOps principles.
Cross Domain Data Exchange and Systems Integration Implementer of Infrastructure as Code - Virtual machine Mngt
Validates security control configuration on systems, ensure all systems are configured to necessary controls, such as STIGS, CMMC, and other similar requirements.
Actively collaborates with customers and external teams, derives tasks from detailed requirements.
Provides tasking to other team members, based off of derived tasks.
Provides software and merge request code reviews.
Acts as the primary gatekeeper for infrastructure as code merges -Ensures software adheres to coding standards and practices.
Skills and Requirements
-Bachelors degree and 5 yrs exp or Masters and 3 yrs exp required.
-Must be able to obtain and maintain Security+ or CISSP within 6 months of hire (DoD Directive 8570.1 IAT Level II)
-Must be able to complete required annual technical training for assigned work roles and proficiency levels (DoD Directive 8140)
Experience with integrating RHEL7 or RHEL8 with Active Directory and utilizing Ansible for configuration management
Advanced knowledge of and skill in the installation and maintenance of information technology hardware and software, requiring a full understanding of industry practices and campus policies and procedures. Included are skills in problem-solving, decision making, customer service, system documentation, and communications.
Full understanding of networking concepts and networked application environments -Active Secret Clearance
-Knowledge of Active Directory management, Powershell scripting, Group Policy Management, and Windows Server Update Services.
-Knowledge of Windows 10/11, Windows Server 2016/2019, Red Hat Enterprise Linux 7/8
-Knowledge of the Risk Management Framework.
-Knowledge of system hardening techniques, including Security Technical Implementation Guidelines. null
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to [email protected].