System Admin Linux

Quantico, VA

Agile Defense

At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions. 

View all jobs at Agile Defense

Apply now Apply later

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.
Requisition #:SYSTE003858
Job Title: System Admin Linux
Location: 27410 Hot Patch Road Quantico, Virginia 22134 (Hybrid)
Clearance Level: Active DoD - Secret
Required Certification(s): DoD IAT III or IAM II Certification. (Candidate has 180 days to attain if they have a lower level 8570 certificate).Related RHEL Certification.
SUMMARYThe successful candidate will use their Red Hat Linux experience to support the Customer in the design and implementation of their Assured Compliance Assessment Solution (ACAS) for the Customer’s Government Enterprise Networks (GEN). The Linux Administrator will operate and maintain the infrastructure for the ACAS solution to support network and appliance scanning and configuration assessments and provide training to operators and Information Assurance personnel to maintain and operate the ACAS tool functionality. JOB DUTIES AND RESPONSIBILITIESInstall and patch operating systems, application, and document Department Information Systems Agency (DISA) Security Technical Implementation Guidelines (STIGs) applicable to each network environment for all ACAS implementations.Assesses current ACAS implementations for each of the GEN networks and recommend changes.Document the steps required to design the ACAS solution for each of the GEN networks to include IP address, Fully Qualified Domain Name, and physical location of each component.Create network diagrams of the designs with Microsoft Visio (include list of hardware and software requirements).Maintains the Nessus scanners and Passive Vulnerability Scanner’s (PVS) connectivity with the associated Security Center (SC).Develop and/or update the Standard Operating Procedures (SOP) to support each of the client ACAS solutions documented within the SharePoint portal.Provide reports as necessary.Build Linux Server from DISA provided ISO image.
QUALIFICATIONS
Required CertificationsDoD 8570 IAT III or IAM II (CASP+, CCNP Security, CISA, GSE, SCNA, CISSP [or Associate], CAP, GSLC, CISM, GCED, GCIH, CISO, or HCISPP). Candidate has 180 days to attain if they have a lower level 8570 certificate.Related RHEL certification
Education, Background, and Years of ExperienceKnowledge and experience with RedHat Linux. Possesses understanding and experience with common cybersecurity toolsets and processes to include STIGs, CAS, IAVA Management and Implementation, and Operation Order (OPORD)/Fragmentary Order (FRAGO) support.3+ years’ experience in supporting, configuring, administering Linux.3+ (RHEL) operating system in an enterprise environment RHEL 7.x or greater.Experience with virtualized environments (vSphere, ESXI).
ADDITIONAL SKILLS & QUALIFICATIONS
Required SkillsRed Hat Enterprise Linux (RHEL) experience.Must be able to troubleshoot SSH connection issues.Good understanding of LVM Partitioning, Disk space and troubleshooting Systems related issues.Familiar with VMware and vSphere.Understanding of SSL/TLS Certificate and OS hardening.Strong understanding of Network configuration and troubleshooting (nmtui, nmcli, service, netstat, grep, top command).Understanding of patching and RPM package management is a must.Be able to troubleshoot Kernel Panic, Root and Grub password Reset, & Firewall configurations.Familiar with Ansible, Ansible-playbook and ansible roles.
Preferred SkillsUnderstanding on Redhat Satellite Version 6.12 or higher.Familiar with Active Directory Concepts, LDAP, or Kerberos.Familiar with migration from RHEL7 to RHEL8 using Leapp utility.Build or configure new YUM Repositories for patching purposes.Familiar with AWS/AZURE Cloud for future projects.Scripting (Nessus Attack Scripting Language (NASL), Python, Bash) .Engineering experience with Nessus Manager and Monitor Implementation.Able to spin new instance on the cloud from a given AMI or Launch Template.Understand the concept of Security Groups, VPC, IAM, Autoscaling, Load Balancer Container architecture.
WORKING CONDITIONS
Environmental ConditionsContractor site with 0%-10% travel possible. Possible off-hours work to support releases and outages. General office environment. Work is generally sedentary in nature but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available.Hybrid, Once Team is fully staffed, Govt is expected to grant 1 day/week of telework. Situational telework is also allowed on a case-by-case basis. Personnel must have accounts and be operationally functional before they can telework (about 2 months from start date).
Strength DemandsSedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical RequirementsStand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse).Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
Happy - Be Infectious.Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)
Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Admin Jobs

Tags: ACAS Active Directory Agile Ansible AWS Azure Bash C CASP+ CCNP CISA CISM CISO CISSP Clearance Cloud Compliance DISA DoD DoDD 8570 Firewalls GCED GCIH GSLC IAM Kerberos LDAP Linux Nessus Python Red Hat Scripting SharePoint SSH STIGs TLS VMware

Perks/benefits: Startup environment Team events

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.