[Close] 

Mid Systems Administrator Top Secret

Company Name:
RCJ Consulting,LLC

Job Code/Title:

Mid Systems Administrator

a. Performs a variety of difficult assignments associated with monitoring and controlling computer operating systems. Supervises and manages the daily activities of configuration and operation of business systems. Optimizes system operation and resource utilization, and performs system capacity analysis and planning. Provides assistance to users in accessing and using business systems. Sets up and maintains more than one type of computer system such as Open VMS Systems/DSM environments, UNIX systems (SCO and SUN), and Windows NT systems. Analyzes system faults and troubleshoots and runs diagnostic tests on operating systems and hardware to detect problems. Evaluates and installs developed software during various phases of testing. Reviews and prepares documentation for systems, tests and installation of software. Investigates and recommends methods and techniques for obtaining solutions. Initiates preventive maintenance on the operating systems as well as repair to system/environment problems. Administers systems/environment solutions for multiple projects with varying schedules. Interfaces with vendors for trouble calls. Supports the planning of system/environment requirements for individual projects. May provide work direction and guidance to others.
Job Description
The applicant must be a self starter, be able to work in a rapid paced environment and must be able to work independently since active participation and a strong technical initiative from a lab environment to deployment and integration of an enterprise global network is important.
The candidate will maintain the smooth operation of a multi-user computer systems, including coordination with network administrators and DBAs. Duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocate mass storage space.
Interacts with users and evaluates vendor products.
Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery.
Develops and monitors policies and standards for allocation related to the use of computing resources. Creates, maintains, and implements detailed documentation and maintains standard operating procedures.
Provides support on a M-F business hours schedule, also responsible for on-call, extended hour, and weekend support as required by mission or emergency situations.
Basic Qualifications
Extensive experience (3 years) with Unix, Oracle/Sun Solaris (9, 10 or 11) required.
Shell scripting (e.g., bash) and experience in other languages like Perl.
Specialized experience requires the application of security settings and other commercial best practices.
Must have excellent people and organizational skills to professionally interact with internal and external organizations.
An active Top Secret security clearance is required for this position.
Must meet DoD 8570 IAT-II certification requirements within 60 days of hire.
Typical Minimums
Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience; or 3 years of professional experience with a related Masters degree. Considered career, or journey, level.
Desired skills
Integration of Network Management (NM) and Element Management (EM) systems with network performance, trouble ticketing, and security subsystems highly desired. Experience with support systems to include enclave Ethernet switches and network attached storage (NAS).
Candidates with a thorough knowledge of networking principles to included TCP/IP, ATM, and frame relay a plus.
Experience with NM applications, such as IBM Tivoli Netcool with additional experience with EM applications such as Cisco Prime Optical, Ciena LightWorks, Sycamore SILVX.
Experience deploying and maintaining Sun Ray Thin clients. ITIL v3 Foundation certified
Security Clearance
DoD Top Secret


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Intelligence Systems Analyst - Principal
Fort George G Meade, MD Jacobs Engineering
Cloud Administrator TS/SCI/Poly
Columbia, MD BTS Software Solutions
Administrative Assitant- CHF Disease Managemen...
Randallstown, MD LifeBridge Health, Inc.
Senior Real Time Systems Requirements and Comp...
Baltimore, MD Exelon