Systems Administrator Manufacturing - Huntsville, AL at Geebo

Systems Administrator

JacobsISG provides information technology solutions and services to a broadrange of both Government and private industry, including Department of Defense,Federal Civilian agencies, healthcare, education, and small/medium businessmarket. Our analysts, engineers, and technicians are highly trained, qualifiedsubject matter experts, understanding each segments specialized businessprocesses, requirements, and functions. Combined with an extensive ITbackground, Information Solutions Group's enhanced IT services enable ourclients to analyze existing business processes, identify process improvements,evaluate associated risks, and develop operational solutions.
ASystem Administrator provides technical oversight of hardware and softwaresystems. Normally a SA provides services on systems that affect a number ofusers. A few examples of these systems would include servers, switches,routers, and firewalls.
Dutiesmay include but are not limited to activities such as implementing andmaintaining system security and data recovery processes, providing technicalsupport, utilizing automation tools for delivering applications, managingassets, monitoring performance, and event notifications and automating desktopsupport.
Inaddition to the technical knowledge and skills, a SA must exhibit excellentcommunication skills. Often working in a team environment with clients and otherIT personnel, a system administrator must coordinate and communicateactivities, status updates, outage notifications and schedule information.
CustomerService:
ASystem Administrator must provide proactive customer-oriented service.Specifically, a SA must:
Provideprofessional service within the parameters specified in the site's servicelevel agreement and/or that meet or exceed the customer requirements
Respondto assigned task orders within the time allotted in the site's service levelagreement and/or that meet or exceed the customer requirements.
Maintainskill set required to do job
Maintainan awareness of trends within the technology industry
Install,configure, administer and optimize servers (hardware and operating systems)
Knowledgeof Microsoft Windows 2012 Server, Microsoft Active Directory and/or LINUXNetwork Operating Systems
Understand,implement and properly maintain network directory services
Install,configure & maintain VMware vSphere environment
Technology:
ASystem Administrator's main technology emphasis should be to:
Install,configure network printing devices
Install,configure and maintain network applications and application distributionsystems
Ensuresystem security in compliance with customer policy including virus protection
Implementand maintain network standards and guidelines
Monitorsystem utilization including data storage management, performance metrics andservice levels
Ensurereliable backup and recovery of necessary data
Developand maintain an automated environment including reporting, event notificationsand actions, software updates and service packs
ConductSecurity Evaluation and Testing for systems for Certification andAccreditation.
Create,maintain and update Plan of Actions and Milestones (POA&M) for varioussystems/LANs.
Coordinatewith ISSOs for mitigating vulnerabilities included in the POA&M
Review,monitor and implement DISA STIG's
RequiredCertifications:
CompTIA'sCASP, or CISSP (must obtain within 6 months)
MicrosoftMCSA, MCSE (must obtain within 6 months)
(VCP)Vmware Certified Professional (must obtain within 6 months)
Thisposition requires a Bachelors degree in a Technical Discipline or related fieldwith 4 years of relevant experience or 8 years of relevant experience. Theminimum of an active Top Secret level DoD Security Clearance is required.
Essential Functions
Physical Requirements
Requiressitting for extended periods of time at a desk (90%). Requires sitting at acomputer terminal for long periods of time (90%). There is a possibility thatdue to parking availability and location of work area walking moderate to longdistances can sometimes be required.
Work Environment
Inside office/cubicle environment. Requires ability tointeract professionally with co-workers and all levels of management (100%).
Equipment and Machines
Requiresability to operate a personal computer, a telephone, copier, and other generaloffice equipment (100%). Ability to conduct evaluation of third and fourthgeneration or current state of the art computer hardware and software and itsability to support specific requirements, interfacing with other equipment andsystems.
Attendance
Attendance is critical. Work hours are normally 8 hoursper day and 5 days per week, Monday through Friday. Being prompt is importantto provide continuous and on-going service to customers. Attendance isimportant to maintain continuity of service. Work outside of normal duty hours maybe required with as little as one hour advance notice. Overtime is infrequent,but important when required (1%).
Other Essential Functions
Must be able to communicate effectively, both verbally and inwriting. Must be able to interface with individuals at all levels of theorganization. Must be able to obtain unescorted access to work areas. Groomingand dress must be appropriate for the position and must not impose a safety risk/hazardto the employee or others. The minimum of an active Top Secret level DoD Security Clearance is required. The following certifications are requiredwithin 6 months of hire:
CompTIA'sCASP, or CISSP (must obtain within 6 months)
MicrosoftMCSA, MCSE (must obtain within 6 months)
(VCP)Vmware Certified Professional (must obtain within 6 months)
. Apply now!Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.