Zachary Piper Solutions
Overview
Zachary Piper Solutions is seeking a System Administrator to join a classified defense aviation program located in Las Vegas, NV through 100% onsite presence. The System Administrator will manage and maintain secure IT infrastructure, configure security tools, monitor system performance, and support national security operations within a high-compliance environment.
Responsibilities
Manage and maintain servers, networks, and IT infrastructure within a secure environment
Install and configure security software and hardware to support classified operations
Monitor system performance, troubleshoot issues, and ensure uptime across mission-critical systems
Apply strong knowledge of operating systems and networking protocols to optimize system reliability
Use system administration tools to automate tasks and streamline operations
Document system configurations, updates, and procedures to support audits and compliance
Qualifications
4+ years in cybersecurity or related IT fields
Bachelor's Degree in Information Technology, Computer Science or a related field
Active DOE Q or Top Secret clearance
Security+ or Red Hat certification
Strong understanding of operating systems, networking protocols, and system security principles
Proficiency with system administration tools and experience managing secure IT environments
Excellent problem-solving and troubleshooting skills to support mission-critical infrastructure
Compensation
Salary Range: $70,000-$75,000
Per diem & relocation assistance available
Benefits: Medical, Dental, Vision, 401k Plan, Holidays, PTO, sick leave as required by law
Keywords: system administrator, sysadmin, secure IT infrastructure, security tools, system performance, emerging threats, attack techniques, threat intelligence reports and documentation, ELK, Junior, Cyber Threat Intelligence, Analyst, NNSA, emerging threat, national security, Journeyman, Cybersecurity, Engineer, Cybersecurity Engineer, defense, DOD, department of defense, aviation, Las Vegas, NV, Nevada, Vegas, architect, deploy, SIEM, Security Information and Event Management, security, collect, analyze, correlate, logs, alerts, Splunk Enterprise Security, IBM Qradar, Splunk, Qradar, Microsoft Sentinel, Sentinel, ArcSight, OpenText, LogRhythm, EDR, Endpoint Detection Response, endpoint, suspicious activity, malware, ransomware, abnormal behavior, CrowdStrike Falcon, CrowdStrike, Microsoft Defender, Defender, SentinelOne, Carbon Black, Sophos Intercept X, individual endpoints, XDR, Extended Detection and Response, NDR, Network Detection and Response, SOC, security operations center, firewall, vulnerabilities, cloud, on-prem, vulnerability, scanning, scan, risk assessment, remediation, system integrity, compliance, hybrid, cloud, on-prem, architectures, AWS, GovCloud, Azure, Amazon Web Services, security controls, security procedures, security compliance, NIST 800-53, NIST, RMF, RMF framework, Risk Management Framework, National Institute of Standards and Technology, audit, DOE, Department of Energy, FISMA, Federal Information Security Modernization Act, DHS, Department of Homeland Security, OMB, Office of Management and Budget, Security and Privacy Controls, CUI, Controlled Unclassified Information, information security program, continuous monitoring, JC3, Joint Cybersecurity Coordination Center, threat detection, incident response, incidence response, IT, information technology, cybersecurity architecture, cybersecurity design, cybersecurity implementation, DOE Q, Q clearance, clearance, Top Secret, Top Secret Clearance, TS, TS Clearance, Computer Science, IDS, intrusion detection system, network, networking, NIDS, network-based intrusion detection system, network traffic, Snort, Suricata, Zeek, Bro, Splunk, Tenable, CrowdStrike, HIDS, host-based intrusion detection system, unauthorized logins, file modifications, privilege escalations, OSSEC, Wazuh, Tripwire, suspicious packets, attack signatures, port scams, malware traffic, IPS, intrusion protection system, cloud security architecture, AWS, GovCloud, Amazon Web Services, Azure, eMASS
#J-18808-Ljbffr
Responsibilities
Manage and maintain servers, networks, and IT infrastructure within a secure environment
Install and configure security software and hardware to support classified operations
Monitor system performance, troubleshoot issues, and ensure uptime across mission-critical systems
Apply strong knowledge of operating systems and networking protocols to optimize system reliability
Use system administration tools to automate tasks and streamline operations
Document system configurations, updates, and procedures to support audits and compliance
Qualifications
4+ years in cybersecurity or related IT fields
Bachelor's Degree in Information Technology, Computer Science or a related field
Active DOE Q or Top Secret clearance
Security+ or Red Hat certification
Strong understanding of operating systems, networking protocols, and system security principles
Proficiency with system administration tools and experience managing secure IT environments
Excellent problem-solving and troubleshooting skills to support mission-critical infrastructure
Compensation
Salary Range: $70,000-$75,000
Per diem & relocation assistance available
Benefits: Medical, Dental, Vision, 401k Plan, Holidays, PTO, sick leave as required by law
Keywords: system administrator, sysadmin, secure IT infrastructure, security tools, system performance, emerging threats, attack techniques, threat intelligence reports and documentation, ELK, Junior, Cyber Threat Intelligence, Analyst, NNSA, emerging threat, national security, Journeyman, Cybersecurity, Engineer, Cybersecurity Engineer, defense, DOD, department of defense, aviation, Las Vegas, NV, Nevada, Vegas, architect, deploy, SIEM, Security Information and Event Management, security, collect, analyze, correlate, logs, alerts, Splunk Enterprise Security, IBM Qradar, Splunk, Qradar, Microsoft Sentinel, Sentinel, ArcSight, OpenText, LogRhythm, EDR, Endpoint Detection Response, endpoint, suspicious activity, malware, ransomware, abnormal behavior, CrowdStrike Falcon, CrowdStrike, Microsoft Defender, Defender, SentinelOne, Carbon Black, Sophos Intercept X, individual endpoints, XDR, Extended Detection and Response, NDR, Network Detection and Response, SOC, security operations center, firewall, vulnerabilities, cloud, on-prem, vulnerability, scanning, scan, risk assessment, remediation, system integrity, compliance, hybrid, cloud, on-prem, architectures, AWS, GovCloud, Azure, Amazon Web Services, security controls, security procedures, security compliance, NIST 800-53, NIST, RMF, RMF framework, Risk Management Framework, National Institute of Standards and Technology, audit, DOE, Department of Energy, FISMA, Federal Information Security Modernization Act, DHS, Department of Homeland Security, OMB, Office of Management and Budget, Security and Privacy Controls, CUI, Controlled Unclassified Information, information security program, continuous monitoring, JC3, Joint Cybersecurity Coordination Center, threat detection, incident response, incidence response, IT, information technology, cybersecurity architecture, cybersecurity design, cybersecurity implementation, DOE Q, Q clearance, clearance, Top Secret, Top Secret Clearance, TS, TS Clearance, Computer Science, IDS, intrusion detection system, network, networking, NIDS, network-based intrusion detection system, network traffic, Snort, Suricata, Zeek, Bro, Splunk, Tenable, CrowdStrike, HIDS, host-based intrusion detection system, unauthorized logins, file modifications, privilege escalations, OSSEC, Wazuh, Tripwire, suspicious packets, attack signatures, port scams, malware traffic, IPS, intrusion protection system, cloud security architecture, AWS, GovCloud, Amazon Web Services, Azure, eMASS
#J-18808-Ljbffr