Clearance Requirement: Top Secret/SCI with counterintelligence (CI) polygraph (in-scope within the past 7 years)
Position Description:
The Systems Administrator II - Desktop Support are the Tier 2 team members of an Information Technology (IT) Enterprise Desktop Support team responsible for the IT-related end client computing requests, patching, and deployment for the customer’s IT business and mission-focus enterprise systems. The Systems Administrators will be directly responsible for planning, receiving, prioritizing, documenting, and actively managing end client computing. Systems Administrator will use common vendor provided, as well as custom internal, management tools to provide consistent desktop configuration and end-user experience. The Systems Administrator must be comfortable handling complex development requirements independently as well as be capable of supporting internally escalated tickets from the IT Enterprise Service Desk team.
The IT Enterprise Desktop team supports a wide array of systems, applications, and services spanning desktop operating systems (OSs), high-performance graphic workstations, thin clients, huddle room conferencing systems, printers, scanners, multifunction printers, and end points on a cross domain solution.
Position Qualifications:
· Shall have 5 or more years of experience working in an enterprise IT desktop administrator role.
· Shall be Microsoft Certified: Modern Desktop Administrator Associate or Microsoft Certified Solutions Associate (MCSA); Windows 10 or 7 certified.
· Demonstrated experience deploying and managing end-client computing of Microsoft Windows desktop platforms or ThinLinux.
· Demonstrated experience providing Desktop Support services to a variety of EUC platforms and applications such as thick, thin, and zero clients – both “physical” and “virtual” – persistent and non-persistent (Citrix Desktops (formerly XenDesktop), appV, and Windows Terminal Services).
· Demonstrated experience working directly with customers – in person or over the phone to elicit all necessary details to capture their IT end-client computing requirements accurately and completely.
· Demonstrated experience with Microsoft and third-party application software installation, configuration, life cycle, management, metering, monitoring, etc.
· Demonstrated experience patching to include operating systems, Microsoft, and third- party patching to include research, testing, installation, troubleshooting, and rollback as needed.
· Demonstrated experience operating and maintaining solutions in secure processing environments which must adhere to U.S. Government Information Assurance and Security standards such as the Defense Information Systems Agency (DISA) Security Requirements Guides (SRGs) and Security Technical Implementation Guides (STIGs).
Shall meet the Cyber IT/Cybersecurity Workforce (CSWF) System Administrator (451); Intermediate Level for SECNAV M-5239.2 compliance. (See Navy Cool WebSite)
Education: Bachelor Degree from accredited University; or CNSSI/NTSSI 4015-Systems Certifiers/4016-Risk Analysts; OR
Training: CYBR1005 Security Essentials; or
NEC 736A Global and Command Control System-Maritime 4.X (GCCS-M 4.X) System Administrator; or
NEC 738A Global Command and Control System-Maritime (4.1) Increment 2 System Administrator; or
NEC 739A Global Command & Control System-Maritime 4.0.3 (GCCS-M 4.0.3) System Administrator; or
NEC 746A Information Systems Technician (IAT II); or
NEC C26A AN/SSQ-137 Ship’s Signal Exploitation Equipment (SSEE) Maintenance Technician; or
NEC C27A Submarine Carry-on Equipment Technician; or
NEC C28A Ship’s Signal Exploitation Equipment Increment Foxtrot (SSEE INC F) Maintenance Tech; or
NEC N71Z CVN Propulsion Plant Local Area Network (PPLAN) Administrator; or NEC T02A AN/BYG-1 (V) TI04 Combat Control Maintenance Technician; or
NEC T04A SSGN Tactical Tomahawk Weapon System (TTWCS) Maintenance Technician; or NEC T09A AN/BYG-1 (V)9 TI-10 Combat Control Maintenance Technician; or
NEC T10A AN/BYG-1 (V) TI-12/14 Maintainer; or NETW 4001 Security Plus; OR
Certification: CompTIA Security+ ce; or
GIAC Security Essentials Certification (GSEC); or Systems Security Certified Practitioner (SSCP); AND
OJT: NAVEDTRA 43345 - Navy Regional Enterprise Messaging System (NREMS); or NAVEDTRA 43347 - Wireless Reach Back System (WRBS); or
NAVEDTRA 43348-A - Shipboard Wide Area Network (SWAN); or NAVEDTRA 43355-1 - Navy Networks; or
NAVEDTRA 43355-1 - Watchstation 302 - Navy Networks; or NAVEDTRA 43355-1 - Watchstation 303 - Navy Networks; or NAVEDTRA 43355-1 - Watchstation 304 - Navy Networks; or NAVEDTRA 43355-1 - Watchstation 305 - Navy Networks; or NAVEDTRA 43359-A - Centrixs-M; or
NAVEDTRA 43555-1D - Global Command & Control System-Maritime 3X (GCCS-M 3X); or NAVEDTRA 43555-3A - Global Command & Control System Maritime 4X (GCCS-M 4X); or NAVEDTRA 43555-4 - Global Command & Control System Maritime Force Level V4.1.X.X (GCCS-M 4.1.X.X); or
NAVEDTRA 43555-5 - Global Command & Control System M Unit Level V4.1.X.X (GCCS-M 4.1.X.X); and
NAVEDTRA 43469 Watchstation 302 - Information Assurance Technician Level II (Privileged User); AND
Continuous Learning: DoD requires 20 hours Continuous Learning each calendar year. This requirement is in addition to any industry certification Continuous Learning requirement. [Note: DoD 20 hours Annually - Industry certification Continuous Learning may be applied towards DoD 20 hour annual requirement. However, not all DoD Continuous Learning hours can be applied to industry certification Continuous Learning requirement, check with certification agency on what may be accepted.]; AND
Operating System/Computing Environment Certificate: Operating System/Computing Environment (OS/CE) certificate of training, as dictated by Command Cyber IT/CSWF-PM; AND
Sign Privileged Access Statement: System Authorization Access Request (SAAR) with Privileged Access agreement as required by Local Command.
Desired Qualifications:
· Familiarity with Microsoft PowerShell and its local and remote diagnostic and analysis capabilities.
· Familiarity with basic Networking troubleshooting concepts and approaches.
· Familiarity with supporting internally escalated tickets from a Service Desk team.
· Familiarity with implementing, troubleshooting, and reporting for IAVAs and IAVBs.
· Familiarity with remediating IA and INFOSEC findings as reported by Tenable Security/CND, etc.
· Demonstrated experience working with remote monitoring and management tools to troubleshoot, assess, and resolve issues across a globally dispersed IT enterprise.