Massachusetts Information Technology Jobs

Search for Jobs in Information Technology
MassHire JobQuest Logo

Job Information

The MITRE Corporation Cybersecurity - System Administrator in Bedford, Massachusetts

Why choose between doing meaningful work and having a fulfilling life? At MITRE, you can have both. That's because MITRE people are committed to tackling our nation's toughest challenges—and we're committed to the long-term well-being of our employees. MITRE is different from most technology companies. We are a not-for-profit corporation chartered to work for the public interest, with no commercial conflicts to influence what we do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're making a difference every day—working for a safer, healthier, and more secure nation and world. Our workplace reflects our values. We offer competitive benefits, exceptional professional development opportunities, and a culture of innovation that embraces diversity, inclusion, flexibility, collaboration, and career growth. If this sounds like the choice you want to make, then choose MITRE—and make a difference with us.

Capable, motivated, self-directed Systems Administrator to work in an isolated enclave consisting of high-performance computer environments as well as celestial and terrestrial labs. Successful candidate will work closely with project engineers and security staff to maintain operations and security of multiple servers and workstations on a LAN or WAN and have strong problem-solving skills.

Installs, configures, troubleshoots, and maintains server configurations to ensure their confidentiality, integrity, and availability. Manages accounts, firewalls, and patches. Responsible for setting up and maintaining a system or specific components of a system. Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.

Key Functions:

  • Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. DISA GPO’s

  • Develop and document systems administration standard operating procedures.

  • Maintain baseline system security according to organizational policies. DISA STIG’s

  • Manage accounts, network rights, and access to systems and equipment.

  • Plan, execute, and verify data redundancy and system recovery procedures.

  • Provide ongoing optimization and problem-solving support.

  • Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.

  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.

  • Work with project engineers and security staff to determine requirements for servers, workstations, and networks configuration/software and then independently plan rollout, implement, and maintain them

  • Assist ISSM/ISSO with coordination between sponsors, MITRE project leaders, and MITRE’s accreditation officials to obtain formal accreditation to operate classified information systems.

  • Research new hardware / software products to acquire life cycle replacements and maintain software licenses to support project requirements and to comply with government regulations.


  • Knowledge of computer networking concepts and protocols, and network security methodologies. (Firewall, DMZ’s, Encryption)

  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk NIST 800-53).

  • Knowledge of cyber threats and vulnerabilities.

  • Knowledge of local area and wide area networking principles and concepts including bandwidth management.

  • Knowledge of performance tuning tools and techniques.

  • Knowledge of server and client operating systems. (Win10, Srv2012-16, RHEL)

  • Knowledge of the enterprise (IT) architecture.

  • Knowledge of the type and frequency of routine hardware maintenance. (Lifecycle Management)

  • Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).

  • Knowledge of system administration, network, and operating system hardening techniques.

  • Knowledge of systems engineering theories, concepts, and methods.

  • Knowledge of operating system command-line tools.

  • Knowledge of network protocols such as TCP/IP, DHCP, DNS, and directory services


  • Skill in configuring and optimizing software.

  • Skill in diagnosing connectivity problems.

  • Skill in maintaining directory services. (e.g., Microsoft Active Directory, LDAP, IDM, etc.).

  • Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, RHEL Hypervisor, etc.).

  • Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware).

  • Skill in interfacing with customers.

  • Skill in troubleshooting failed system components (i.e., servers)

  • Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.


  • Ability to function effectively in a dynamic, fast-paced environment.

  • Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

  • Ability to establish and maintain automated security control assessments – ACAS, SCAP

  • Ability to operate common network tools (e.g., ping, traceroute, nslookup).

  • Ability to collaborate effectively with others

Required Qualifications:

  • Active Top Secret clearance, will consider Secret.

  • In accordance with DoD 8570.01M, the selected individual must meet the requirements of an IAT Level II as a condition of employment and computing environment training/certification.

Preferred Qualifications:

  • Experience with Risk Management Framework (RMF), NIST SP 800-53, Security Technical Implementation Guides (STIGs) and Security Content Automation Protocol (SCAP) Compliance Checker (SCC). Knowledge of Information Assurance Vulnerability Alerts (IAVAs).

This requisition requires the following clearance(s):

MITRE is proud to be an equal opportunity employer. MITRE recruits, employs, trains, compensates, and promotes regardless of race, religion, color, national origin, gender, gender expression, sexual identity, disability, age, veteran status, and other protected status.

MITRE intends to maintain a website that is fully accessible to all individuals. If you are unable to search or apply for jobs and would like to request a reasonable accommodation for any part of MITRE’s employment process, please contact MITRE’s Recruiting Help Line at 703-983-8226 or email at

Copyright © 1997-2021, The MITRE Corporation. All rights reserved. MITRE is a registered trademark of The MITRE Corporation. Material on this site may be copied and distributed with permission only.

At MITRE, we solve problems for a safer world. Through our federally funded R&D centers and public-private partnerships, we work across government to tackle challenges to the safety, stability, and well-being of our nation. As a not-for-profit organization, MITRE works in the public interest across federal, state and local governments, as well as industry and academia. We bring innovative ideas into existence in areas as varied as artificial intelligence, intuitive data science, quantum information science, health informatics, space security, policy and economic expertise, trustworthy autonomy, cyber threat sharing, and cyber resilience.