Job Details

Senior System Administrator

  2025-08-05     Cape Fox Shared Services     all cities,NV  
Description:

Cape Fox is seeking an experienced Senior System Administrator (SSA) to join our team in support of a government customer. The SSA is responsible for management oversight and completion of the task. SSA support will follow guidance documented in the Protecting Sensitive Compartmented Information within Information Systems (IS) (DCID 6/3).

Responsibilities:

  1. Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan.
  2. Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.
  3. Collect, reduce, and review audit trails and report all security-related incidents to the Information Assurance Manager (IAM).
  4. Initiate, with the approval of the IAM, protective or corrective measures when a security incident or vulnerability is discovered.
  5. Develop and maintain a System Security Plan (SSP) as described in Appendix C of DCID 6/3.
  6. Conduct periodic reviews to ensure compliance with the SSP.
  7. Ensure configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented.
  8. Conduct trusted recovery of PL/4 devices and monitor system recovery processes to ensure security features and procedures are properly restored.
  9. Ensure all IS security-related documentation is current and accessible to authorized individuals.
  10. Formally notify the IAM and the Designated Accreditation Authority (DAA) when a system no longer processes intelligence or when changes occur that might affect accreditation.
  11. Address system security requirements during all phases of the system life cycle.
  12. Follow procedures developed by the IAM for installing only authorized software, hardware, scripts, firmware, and AFCERTS.
  13. Protect the root or super-user authenticator at the highest level of data it secures.
  14. Report all suspected security-related IS problems to the CL or IAM.
  15. Use special access or privileges only to perform authorized tasks and functions.
  16. Enroll authorized users in an IS, perform account unlocking, and perform network administration tasks such as adding new equipment and notifying the CL of configuration changes.
  17. Perform mission data backup, restore, verify data archiving, and check data integrity as required.
  18. Perform database maintenance, including user account creation and maintenance.
  19. Configure communication ports.
  20. Report security incidents promptly.
  21. Ensure compliance with field-level TCTO instructions, including software baseline upgrades.
#J-18808-Ljbffr


Apply for this Job

Please use the APPLY HERE link below to view additional details and application instructions.

Apply Here

Back to Search