Job Description:
Looking for an opportunity to make an impact?
At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.
Are your ready for your next challenge?
We are in search for a Linux System Administrator – Active TS/SCI Required to work at our customer site at the National Maritime Intelligence Center, Suitland, MD. In this role you will provide operations, engineering, and technical support services and associated supplies to support certain AWS resources, Red Hat Enterprise Linux servers, Splunk software, Python scripting language, REGEX parsing, and .xml presentation format development, architecture, administration, and Risk Management Framework (RMF) requirements and operations of the Hopper ISC CYBERDEP Security Information Event Management and NAVINTEL Enterprise Audit Capability (SIEM/NEAP).
THE MISSION
The Hopper Information Services Center (ISC) is an IT service provider for the Office of Naval Intelligence (ONI) and for 70+ Navy Intelligence Community (IC) ashore organizations across the globe with the mission to deploy and operate classified information systems, networks, communications systems, and cybersecurity capabilities. Within Hopper ISC, the Cybersecurity Department (CYBRDEP) is comprised of four divisions (Defensive Cybersecurity Operations [N62], Cybersecurity Mission Operations [N63], Assessment & Validation [N64], and Cybersecurity Engineering [N66]), and these divisions collectively secure, protect, assess, and monitor fielded Information Technology (IT) capabilities against a full range of internal and external threats.
Security Information Event Management (SIEM) platforms support threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting). Enterprise Audit is an activity that “provides authorized personnel with the ability to review and examine any action that can potentially cause access to, generation of, or affect the release of classified or sensitive information.”
If this sounds like the kind of environment where you can thrive, keep reading!
THE CHALLENGE
* Provide assistance and direction to the Hopper Information Services Center in deploying, developing, maintaining, operating, administering, and supporting the technology capable of SIEM ingest and display as well as automating auditing in accordance with ICS-500-27 to identify, record, and report anomalous user activities that might be indicative of potential compromises of classified or sensitive information.
* Act as the subject matter expert (SME) In a System Administration capacity and participate in meetings, working groups, system demonstrations, and conferences in support of the effort. Consider and present various alternatives for implementation including identification and prioritization of resource requirements, the cost for additional tools, timeframe for implementation, and risks.
* Coordinate across IT domains and multiple teams (internal and external) and influence Hopper ISC regarding solution design, process and/or approaches to ensuring all SIEM and EAC systems are up-to-date, working efficiently and ensure all mission requirements are met.
* Build, configure, implement, develop, and maintain the NAVINTEL Enterprise Audit Capability (EAC), which currently consists of Splunk Enterprise, Splunk Enterprise Security, and a Filtered Audit Data (FAD) Distribution Point (DP) to support both the transmitting and receiving of audit data to and from the EAC.
* Perform upgrades, performance tuning, configuration management and on-going operations and maintenance of the EAC to ensure effectiveness, health, performance, security, scalability, and proper ingest of pertinent log information from all NAVINTEL endpoints.
* Provide documentation to support the design, development, integration, configuration, installation, administration, operations, security assessment, and authorization, and disaster recovery of the EAC.
* Provide support in the Assessment and Authorization (A&A – formerly C&A) of the Enterprise Audit hardware and software.
* Participate in meetings, working groups, system demonstrations, and conferences in support of the effort. This includes the monthly Intelligence Community Audit Subcommittee (ICAS) and meetings/correspondence with Program of Record stakeholders/system administrators to get their data ingested properly.
* Provide analysis and assessment results to the Government and make recommendations to resolve identified discrepancies, evaluating existing rule sets, and tuning, modifying, or developing existent/new search/dashboard/rule sets to achieve program objectives.
* Build, configure, implement, develop, and maintain *NIX servers to support the EAC. This includes a number of distributed Splunk Search Heads, Indexers, Cluster Master, Forwarders, Heavy Forwarders, Licensing Server, Deployment Server, and ITS server.
* Build, configure, implement, develop, and maintain all servers and related infrastructure within Amazon Web Services (AWS) by utilizing the AWS console. This includes a number of Elastic Compute Cloud (EC2s), Elastic Block Storage (EBS), Simple Storage Service buckets, etc. to include monitoring the AWS burn rate and advise the Government on configuration changes to ensure that the expenditure does not exceed the amount budgeted.
* Develop and maintain project schedules and Plan of Actions and Milestones (POA&M) to support the system lifecycle activities in this effort and those, as required, for the NAVINTEL Information Assurance (IA) Program as a whole such as answers to security controls for RMF documentation.
MINIMUM QUALIFICATIONS
*Active DoD TS/SCI clearance
*Active CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, or CCSP certification
*An OS-specific (Linux) administration certification
*12+ yrs of systems administration experience
*10+ years experience in the installation, implementation, configuration, testing (functional and security), operations, maintenance and patching of Red Hat Enterprise Linux (RHEL) Operating Systems (OS).
*10+ years of experience in complex pattern matching with REGEX and writing and implementing scripts to automate tasks within Linux systems, Python preferred.
*5+ years AWS console experience, including creating AMI/EC2s; managing snapshots; cloning systems from snapshots; managing EBS, S3, and Glacier volumes; start/stop/restarting instances, etc.
*5+ years experience in the architecture design, installation, configuration, testing (functional and security) and administration of Splunk Enterprise and Enterprise Security software, Add-Ons, Apps, and other components.
*Experience with integrating information and information transport systems and data sources.
*Experience in scripting the parsing and movement of log data to and from encoded .xml files to Splunk indexers utilizing REGEX functions and cron jobs.
*Experience in generating system health and performance reports, and briefing other team members and/or senior management on findings with recommendations for resolution.
*Experience in continuous monitoring and the Risk Management Framework, creating documents for the RMF body of evidence such as System Security Plans, answers to security controls and POA&Ms, running SCAP scans, etc.)
*Experience in the development of technical system installation and administration documentation as well as operator manuals.
*Experience in the development of architecture diagrams utilizing diagramming software such as Microsoft Visio.
Pay Range: