Net/Sys Admin II - Network/System Administrator
Listed on 2026-01-11
-
IT/Tech
Cybersecurity, Network Security
Net/Sys Admin II - Network/System Administrator
Watermark is a Service‑Disabled Veteran Owned Small Business founded by USAF veterans in 2007. We specialize in security and risk management, with deep familiarity of DOD security programs and mission requirements.
Our core values are Perspective, Passion, Communication, Integrity, Ethics, and Balance. We offer a competitive benefits package that includes 100% employer‑paid medical insurance, paid leave, a free employee assistance program, and a competitive 401(k) plan.
Role OverviewThe primary function will be to organize, install, and support the organization’s computer systems, including LANs, WANs, network segments, intranets, and other data communication systems. You will help architect, design, and analyze network models and participate in decisions about buying future hardware or software to upgrade infrastructure. The role may provide technical support to computer users and will support activities within Special Access Programs (SAPs) for DOD agencies.
Responsibilities- Lead IT ops team on day‑to‑day management and operations of networks and implement capabilities vetted through Cybersecurity, ISSE, and higher headquarters to maintain JSIG/RMF Authority to Operate and continuous monitoring tools and processes.
- Manage COTS & GOTS products to collect, display, and remediate a variety of automated system security and system operations/performance functions and metrics.
- Assist during security assessments of servers, network devices, and security appliances.
- Create operational O&M checklists, build TTPs and SOPs, and maintain service checklists.
- Operate monitoring tools/capabilities with enterprise SIEM and create and tailor complex event alarms and summary reports.
- Execute cybersecurity operations procedures for day‑to‑day network management, operations, and maintenance.
- Monitor and analyze output of cybersecurity‑related tools for reportable security incidents and residual risk.
- Assist in analyzing technical risk of emerging cybersecurity tools and processes.
- Act as part of a security incident response team as needed.
- Assist ISSM/ISSO/ISSE with integration/development of new techniques to improve confidentiality, integrity, and availability for networks/systems at various classification levels.
- Demonstrate advanced technical competency in platforms such as Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux, Hyper‑V/VMware/ESX/Xen Hypervisors, enterprise networking/firewalls, intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management, scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server, Tomcat, IIS, Windows Server 2012‑2016, Windows 10, Red Hat 6.5, Microsoft Office, Log Rhythm, ACAS/Nessus/SCAP, mandatory role‑based access control, video teleconferencing/VOIP, Oracle/SQL database security, and Apache/IIS web server security.
- Perform additional duties as assigned.
- 3–5 years of related experience.
- Bachelor’s degree in a related field, or Associate’s degree + 2 years’ experience, or equivalent experience (4 years).
- Must meet DoD Directive 8570.01‑M Information Assurance Technician Level 2 within 6 months of hire.
- Preferred IAT Level III certification (e.g., CASP, CISSP).
- Top Secret clearance with SCI eligibility.
- Eligibility for access to Special Access Program Information.
- Willingness to submit to a counterintelligence polygraph.
- Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and RHEL administration.
- Experience in effective communication and collaboration in a high‑performance team environment.
- Group Policy design and configuration.
- Working knowledge of Cisco networking, switching, virtualization technologies.
- Knowledge of LAN & WAN technologies and data backup.
- Knowledge of communication security (COMSEC) policies and integration.
- Knowledge of Risk Management Framework, Common Criteria, System Security Policy.
- Knowledge of PL2, PL3, and PL4 network environments/systems.
- Knowledge of WSUS and/or YUM patch…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).