Linux Administrator with Security Clearance Law Enforcement & Security - Dahlgren, VA at Geebo

Linux Administrator with Security Clearance

Top Skills' Details:
-IAT Level II Cert and Interim or Active Secret Clearance-Minimum three - six years' experience in system administration of Linux-based servers and Linux-based workstations- Ideal Linux Admin will have Department of Defense experience with security guidelines and policies(DISA STIGS) is a plus-Seeking specific experience with the following operating systems and services is required:
Red Hat Enterprise Linux (RHEL 7.
x) Nice to Haves-Have knowledge of corporate services including:
DNS, SMTP, RHEV, Splunk, Apache-Demonstrated experience managing the installation and maintenance of IT infrastructure-Hardware experience with Dell systems is a plus- Experience working in an environment with rapidly changing job priorities-ServiceNow ITSM Ticket Management experience-Linux
or Red Hat Certification preferred Secondary Skills - Nice to HavesLinuxRed hatLinux red hatScriptingAnsible Job DescriptionTEKsystems seeks a Linux Administrator to join our growing team in Dahlgren, VAWorking as part of a team, administer and manage servers and end-user workstations in both unclassified and classified network environments on a Research, Development, Test and Evaluation (RDT&E) ProgramEssential responsibilities of the Senior Linux Administrator include, but are not limited to:
o Utilize Red Hat Enterprise Linux system administration experience to provide technical problem solving and in-depth consulting relative to system operations o Automate installation methods and system imaging (e.
gKickstart/Ansible) o Use cryptographic experience to set up public key infrastructure (PKI) to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption o DISA STIG implementation and work within Configuration-Managed Environments o Analyze, design, and implement modifications to system software to improve and enhance system performance by correcting errors o Plan new hardware acquisitions, interact with vendors, educate customers, and collaborate with other projects within the organization o Work closely with engineers to help them use workstations and servers to solve their computationally intensive problems o Support application installation, license management, software tracking / distribution and backup/recovery of system configurations and user data files o Understand and use essential tools for handling files, directories, command-line environments, and documentation o Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services o Configure local storage using partitions and logical volumes o Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems o Deploy, configure, and maintain systems, including software installation, update, and core services o Manage users and groups, including use of a centralized directory for authentication o Manage security, including basic firewall and SELinux configuration o Configure static routes, packet filtering, and network address translation o Set kernel runtime parameters o Produce and deliver reports on system utilization o Use shell scripting to automate system maintenance tasks o Configuring system logging, including remote logging o Configure a system to provide networking services, including HTTP/HTTPS, DNS, SMTP, SSH and NTP Recommended Skills Access Control List Ansible Automation Corporate Services Dns Information Technology Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.