KEYW Corporation

  • Linux System Administrator

    Job Locations 1 month ago(12/7/2018 10:40 AM)
    # of Openings
    Posted Date
    System Administration
    Job Locations
  • Overview

    KeyW Corporation is currently seeking a Systems Administrator with a current Top Secret clearance located in Chantilly, VA.


    Provide technical services that include the design, acquisition, development implementation, systems administration, O&M, and engineering support for existing and new NCIJTF IT assets to include networks, systems, platforms, tools, and applications.


    Operations and Maintenance

    • Monitor the health of the overall NCIJTF systems platform.
    • Identify and correct hardware, software and network failures and provide emergency corrective actions that ensure system availability to all NCIJTF stakeholders, technology experts, and users.
    • Document and update events and mitigation strategies and IT Standard Operation Procedures (SOPs). At a minimum, monitor the following on a continuous basis:


    • CPU Utilization
    • Mem Utilization
    • RAM Utilization
    • Disk Utilization System/Application Processes
    • Disk Input/output
    • Avg/Max Response time
    • Timeouts


    • Bandwidth Utilization Interface/Port Input/output
    • Packet loss
    • Timeout
    • Round Trip Time
    • Uptime / Downtime


    Operating System Maintenance

    • Design, acquisition, development implementation, systems administration and maintenance on various MAC OSX, Linux, or other UNIX based Operating Systems (OS) and for designing and maintaining the overall storage architecture andits components (e.g., NetApp, EMC, cloud storage)
    • Provide technical support for approximately 110 hosts running various OSsystems (e.g., CentOS, RedHat, and Ubuntu) in support of evolving NCIJTF requirements.
    • Design, acquisition, development, implementation,systems administration and maintenance of Microsoft-based operating systems and applications.
    • Operations and maintenance of the NCIJTF’s current andevolving portfolio of applications and tools in a Linux environment. Support includes, but is notlimited to, the installation, configuration, management, and monitoring of:
    • Apache Tomcat Java container system
    • Apache Solr
    • Elasticsearch
    • Apache Web Services
    • IMAP and SMTP servers
    • Vmware and Vsphere environments
    • Database administration, with experience primarily in, but not limited to, MySQL


    Infrastructure and Network Maintenance

    • Provide secure network services and identity management, (e.g., via Kerberos and Directory Services) and ensure continued IT asset operability within a blended environment by utilizing software, hardware, and networking solutions inherent within the existing production environment. At a minimum, install, configure, manage, and monitor services to include the following: 
    • Domain Name System (DNS)
    • Directory Services (Apple OpenLDAP, FreelPA)
    • Kerberos 
    • Design and implement host and network-wide system policies. This task requires the scripting and design of processes that enable new network functionality. Scripting languages shall include, but are not limited to, Python, Bash, and Perl. 
    • Maintain all hardware, software and networks in compliance with all
    • established security requirements to maintain an FBI accreditation.
    • Complete all security and vulnerability patching within the Vulnerabilities Patch Requirement (VPR) Guidelines provided by the FBI and comply with all applicable FBI policy guidelines.
    • Make compliant any systems identified by the Government security team as deficient.
    • Patch and/or upgrade all workstations and servers within 90 days of validating any new OS release.
    • Update the NCIJTF’s IT infrastructure with new and emerging technologies.


    System Administration

    • Operate, maintain, and provide engineering support and administrator functions, including directory services and policy, for database management for all NCIJTF systems and networks as required to support NCIJTF operations.
    • Ensure performance and reliability are in accordance with the usability requirements outlined in the SLA and implement remediation activities in the event of performance issues.
    • Provide NCIJTF users with account management support to include:
    • Create/manage/and modify users accounts based on end user and security requirements followed with updating trouble ticket within three business day.
    • Conduct user account management (such as creating and modifying accounts according to policy and installing/configuring software).
    • Work with software developers, vendors, and server SAs to analyze, resolve, and document resolution in compliance with the SLA.


    Support the daily data transfer of ad-hoc data provided by external sources into the NCIJTF IT environment. This includes the manual transfer of files from one enclave to another using optical media, or other means, to facilitate the data ingest requirements by system users.


    Application Maintenance

    • Conduct a technical refresh, coordinated with the application and tool development team, to ensure the NCIJTF IT assets continue to perform levels that meet or exceeds the operational requirements of the evolving threat environment.
    • Provide support for existing and new custom-built NCIJTF applications and tools to include those responsible for ingest and processing of cyber data into the NCIJTF IT environment. This includes monitoring of custom-built applications and tools to handle data
    • ingest as well as Extract Transform and Load (ETL) processes. Also included is maintenance and monitoring of cross-domain and One-Way-Transfer systems.
    • Implement and maintain open-source software frameworks for storing and processing big data for massive data storage and high performance processing.


    Minimum qualifications include:

    • Top Secret clearance
    • Master’s degree in Business, Engineering, Management Sciences, Computer Science, Information Systems, or other related disciplines with two years of relevant experience in system architecture for enterprise-level systems;


      Bachelor’s degree in Business, Engineering, Management Sciences, Computer Science, Information Systems, or other related disciplines with four years of relevant experience in system architecture for enterprise-level systems;


      Associate’s degree in Business, Engineering, Management Sciences, Computer Science, Information Systems, or other related disciplines with six years of relevant experience in system architecture for enterprise-level systems;


      Eight years of relevant experience.


    • Preferred Certifications

      RedHat Certified Engineer (RHCE), Microsoft Certified Systems Engineer (MCSE), Apple Certified

      System Administrator (ACSA). The following Amazon Web Services (AWS) certifications are desired at the Associate level, while at least one contractor staff member should have the desired certification(s) at the Professional level: AWS Certified Solutions architect, AWS Developer, AWS Certified SysOps Administrator, and/or AWS Certified DevOps Engineer.

    All staff proposed for this task shall show proficiency and/or qualifications in the following


    • Linux system administration
    • Vmware ESX administration
    • Apple OSX system administration/deployment
    • Linux and OSXD scripting (e.g., Bash, Python, Perl)
    • Cisco network administration

    Proposed contactor staff shall have demonstrated experience in the following areas:

    • Management of large storage subsystems (e.g., NetApp, EMC) in a petabyte and distributed environment.
    • Design and deployment of cloud environments, including but not limited to, Amazon C2S.
    • Working knowledge of Federal government certification and accreditation (C&A) practices and policies, particularly Federal Information Security Management Act (FISMA), and National Institute of Standards and Technology (NIST) 800-53.

    This position requires that the candidate possess a Top Secret security clearance




    About the Organization

    KeyW is a pure-play national security solutions provider for the Intelligence, Cyber and Counterterrorism Communities' toughest challenges. We support the collection, processing, analysis and dissemination of information across the full spectrum of their missions. We employ and challenge more than 2,000 of the most talented professionals in the industry with solving such complex problems as preventing cyber threats, transforming data into intelligence and combating global terrorism.


    KeyW, together with its direct and indirect subsidiaries, encourages and actively supports a policy of Equal Employment Opportunity and commits to provide equal opportunity to each individual, regardless of race, color, religion, gender, sexual orientation, age, national origin or ancestry, marital status, veteran status, disability or any other classifications protected by Federal, State or local law. In fact, we foster an environment that promotes diversity, balance and fun—because we believe in the importance of having a workplace as unique as the challenges we solve.


    Top Secret

    KeyW EEO Statement

    KeyW is an EEO employer. We are committed to providing fair and equal employment consideration, regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status or disability.
    How to Apply?
    Please click apply on the right


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share to your network!

    Need help finding the right job?

    We can recommend jobs specifically for you! Click here to get started.