MIT Lincoln Laboratory Systems Administrator - Special Programs in Lexington, Massachusetts
The Security Services Department's overall mission is to ensure a safe and secure environment and protect MIT Lincoln Laboratory at all facilities in which staff members perform their mission of research and development. To accomplish this mission, this department formulates and implements policies, plans, and actions designed to protect facilities against threats of vandalism, accidental destruction, and sabotage; and safeguards personnel, classified and unclassified information systems, personal identifiable information, property, and other assets from exploitation and recruitment by foreign intelligence agencies.
Systems Administrator (SA) – IT IC Level 4 (Special Programs)
The Systems Administrator (SA) – IT IC Level 4 (Special Programs) is responsible for the effective provisioning, installation/configuration, operation, and maintenance of information systems (IS) hardware and software and related infrastructure. This position also requires the candidate to provide technical support associated with incident response and/or forensic analysis within special program areas. The SA works with the SSD security team to ensure that system hardware, operating systems, software systems, and related procedures are compliant with Security Services Department policies and applicable Sponsor policies.
The successful candidate may be required to work independently and/or as a team member. Candidate must be a quick learner, self-motivated, reliable, and able to balance multiple tasks simultaneously. Candidate must have strong interpersonal skills and be able to manage stress in a professional manger. Knowledge of installation, integration, and optimization of system components; knowledge of server and client operating systems, Knowledge of virtualization technologies and virtual machine development and maintenance, and knowledge of system/server diagnostic tools and fault identification techniques. Ability to monitor measures or indicators of system performance and availability and the ability to identify incidents, problems, and events that could negatively affect security and/or system performance.
Candidate must have the ability to apply network security concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Skill in monitoring and optimizing system/server performance and skill in operating system administration. (e.g., account maintenance, data backups, maintain system performance, install and configure new hardware/software).
Candidate must be knowledgeable in computer security principles and policies, to include, Security Technical Implementation Guides (STIGs), National Industrial Security Program Operating Manual (NISPOM), NIST 800-53 / Risk Management Framework (RMF), Joint SAP Implementation Guide (JSIG), Intelligence Community Directive (ICD) 503, and DoD Manual 5205.07 Volumes 1- 4. Candidate must have strong technical skills and be able to respond to off-hours emergencies. Position requires occasional local and overnight travel.
Monitor and maintain system/server configuration.
Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.
Diagnose and perform repairs on faulty system/server hardware.
Install, update, and troubleshoot systems/servers.
Develop and document systems administration standard operating procedures.
Plan, execute, and verify data redundancy and system recovery procedures.
Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.
Provide ongoing optimization and problem-solving support.
Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
Core Responsibilities (cont.)
Maintain database management systems software.
Maintain directory replication services that enable information to replicate automatically from rear servers to forward units via optimized routing.
Perform backup and recovery of databases to ensure data integrity.
Provide recommendations on new database technologies and architectures.
Install and configure database management systems and software.
Prepare digital media for imaging by ensuring data integrity (e.g., write blockers in accordance with standard operating procedures).
Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost, Encase etc.).
Use specialized equipment, tools, applications, and techniques to catalog, document, extract, collect, package, and preserve digital evidence.
Core Responsibilities (cont.)
Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CDs, PDAs, mobile phones, GPS, and all tape formats.
Conduct network, system, and application vulnerability scanning, configuration assessment, and remediation.
Serve as a member of the Special Programs Information Security Incident Response Team and lead efforts in investigations and remediating incidents and preserve data for potential criminal prosecution.
BS degree in Computer Science, Computer Engineering, Information Technology, Computer Information Systems, or related discipline is required
A minimum of 6 years of IT security experience in DoD Information Security is required
Possess a DoD 8570.01-M Information Assurance Technical Level II (IAT III) baseline certification (e.g. CCNP Security, CASP + CE, CISSP, CISA, GCED, or GCIH) or be able to obtain one within 6 months of hire
Technical experience, skills, and course work completed towards a Graduate Degree, or industry IT certifications may be considered in lieu of DoD security experience requirements
Demonstrated understanding of the following security frameworks is required:
NIST 800-53 / Risk Management Framework (RMF)
Joint SAP Implementation Guide (JSIG) or National Institute of Standard and Technology Special Publication 800-53 rev 4, Security & Privacy Controls for Federal Information Systems
National Institute of Standard and Technology Special Publication 800-160 Vol 2, Developing Cyber Resilient Systems and Organizations
DoD Manual 5205.07 Volumes 1- 4, Special Access Programs
Experience and familiarity with multiple operating systems such as Windows Server 2012, 2016 and 2019, Windows 7 and 10, Red Hat Enterprise Linux, Ubuntu, Mac, etc.
Experience maintaining directory services. (e.g., Microsoft Active Directory, LDAP, etc.).
Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.).
Experience in database administration a plus
Technical experience securing networks and systems utilizing DISA STIGs and/or SRGs is highly desired
Selected candidate will be subject to a pre-employment background investigation and possess a current in scope Top Secret level security clearance with compartmental program eligibility.
For Benefits Information, click http://hrweb.mit.edu/benefits
Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.
MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.S. citizenship is required.
Requisition ID: [[id]] #CJ