Yesterday
DoE Q or L
$70,000 - $75,000
Unspecified
IT - Hardware
Las Vegas (On-Site/Office)
Zachary Piper Solutions  is seeking a System Administrator  to join a classified defense aviation program located in  Las Vegas, NV through  100% onsite presence . The  System Administrator  will manage and maintain secure IT infrastructure, configure security tools, monitor system performance, and support national security operations within a high-compliance environment .
Responsibilities of the System Administrator include:
Qualifications of the System Administrator include:
Compensation for the System Administrator includes:
Keywords: system administrator, sysadmin, secure IT infrastructure, security tools, system performance, emerging threats, attack techniques, threat intelligence reports and documentation, ELK, Junior, Cyber Threat Intelligence, Analyst, NNSA, emerging threat, national security, Journeyman, Cybersecurity, Engineer, Cybersecurity Engineer, defense, DOD, department of defense, aviation, Las Vegas, NV, Nevada, Vegas, architect, deploy, SIEM, Security Information and Event Management, security, collect, analyze, correlate, logs, alerts, Splunk Enterprise Security, IBM Qradar, Splunk, Qradar, Microsoft Sentinel, Sentinel, ArcSight, OpenText, LogRhythm, EDR, Endpoint Detection Response, endpoint, suspicious activity, malware, ransomware, abnormal behavior, CrowdStrike Falcon, CrowdStrike, Microsoft Defender, Defender, SentinelOne, Carbon Black, Sophos Intercept X, individual endpoints, XDR, Extended Detection and Response, NDR, Network Detection and Response, SOC, security operations center, firewall, vulnerabilities, cloud, on-prem, vulnerability, scanning, scan, risk assessment, remediation, system integrity, compliance, hybrid, cloud, on-prem, architectures, AWS, GovCloud, Azure, Amazon Web Services, security controls, security procedures, security compliance, NIST 800-53, NIST, RMF, RMF framework, Risk Management Framework, National Institute of Standards and Technology, audit, DOE, Department of Energy, FISMA, Federal Information Security Modernization Act, DHS, Department of Homeland Security, OMB, Office of Management and Budget, Security and Privacy Controls, CUI, Controlled Unclassified Information, information security program, continuous monitoring, JC3, Joint Cybersecurity Coordination Center, threat detection, incident response, incidence response, IT, information technology, cybersecurity architecture, cybersecurity design, cybersecurity implementation, DOE Q, Q clearance, clearance, Top Secret, Top Secret Clearance, TS, TS Clearance, Computer Science, IDS, intrusion detection system, network, networking, NIDS, network-based intrusion detection system, network traffic, Snort, Suricata, Zeek, Bro, Splunk, Tenable, CrowdStrike, HIDS, host-based intrusion detection system, unauthorized logins, file modifications, privilege escalations, OSSEC, Wazuh, Tripwire, suspicious packets, attack signatures, port scams, malware traffic, IPS, intrusion protection system, cloud security architecture, AWS, GovCloud, Amazon Web Services, Azure, eMASS
#LI-SW1 #LI-ONSITE
Responsibilities of the System Administrator include:
- Manage and maintain servers, networks, and IT infrastructure within a secure environment
 - Install and configure security software and hardware to support classified operations
 - Monitor system performance, troubleshoot issues, and ensure uptime across mission-critical systems
 - Apply strong knowledge of operating systems and networking protocols to optimize system reliability
 - Use system administration tools to automate tasks and streamline operations
 - Document system configurations, updates, and procedures to support audits and compliance
 
Qualifications of the System Administrator include:
- 4+ years in cybersecurity or related IT fields
 - Bachelor's Degree in Information Technology, Computer Science or a related field
 - Active DOE Q or Top Secret clearance
 - Security + or Red Hat certification
 - Strong understanding of operating systems, networking protocols, and system security principles
 - Proficiency with system administration tools and experience managing secure IT environments
 - Excellent problem-solving and troubleshooting skills to support mission-critical infrastructure
 
Compensation for the System Administrator includes:
- Salary Range: $70,000-$75,000 **depending on experience**
 - Per diem & relocation assistance available
 - Benefits: Medical, Dental, Vision, 401k Plan, Holidays, PTO, sick leave as required by law
 
Keywords: system administrator, sysadmin, secure IT infrastructure, security tools, system performance, emerging threats, attack techniques, threat intelligence reports and documentation, ELK, Junior, Cyber Threat Intelligence, Analyst, NNSA, emerging threat, national security, Journeyman, Cybersecurity, Engineer, Cybersecurity Engineer, defense, DOD, department of defense, aviation, Las Vegas, NV, Nevada, Vegas, architect, deploy, SIEM, Security Information and Event Management, security, collect, analyze, correlate, logs, alerts, Splunk Enterprise Security, IBM Qradar, Splunk, Qradar, Microsoft Sentinel, Sentinel, ArcSight, OpenText, LogRhythm, EDR, Endpoint Detection Response, endpoint, suspicious activity, malware, ransomware, abnormal behavior, CrowdStrike Falcon, CrowdStrike, Microsoft Defender, Defender, SentinelOne, Carbon Black, Sophos Intercept X, individual endpoints, XDR, Extended Detection and Response, NDR, Network Detection and Response, SOC, security operations center, firewall, vulnerabilities, cloud, on-prem, vulnerability, scanning, scan, risk assessment, remediation, system integrity, compliance, hybrid, cloud, on-prem, architectures, AWS, GovCloud, Azure, Amazon Web Services, security controls, security procedures, security compliance, NIST 800-53, NIST, RMF, RMF framework, Risk Management Framework, National Institute of Standards and Technology, audit, DOE, Department of Energy, FISMA, Federal Information Security Modernization Act, DHS, Department of Homeland Security, OMB, Office of Management and Budget, Security and Privacy Controls, CUI, Controlled Unclassified Information, information security program, continuous monitoring, JC3, Joint Cybersecurity Coordination Center, threat detection, incident response, incidence response, IT, information technology, cybersecurity architecture, cybersecurity design, cybersecurity implementation, DOE Q, Q clearance, clearance, Top Secret, Top Secret Clearance, TS, TS Clearance, Computer Science, IDS, intrusion detection system, network, networking, NIDS, network-based intrusion detection system, network traffic, Snort, Suricata, Zeek, Bro, Splunk, Tenable, CrowdStrike, HIDS, host-based intrusion detection system, unauthorized logins, file modifications, privilege escalations, OSSEC, Wazuh, Tripwire, suspicious packets, attack signatures, port scams, malware traffic, IPS, intrusion protection system, cloud security architecture, AWS, GovCloud, Amazon Web Services, Azure, eMASS
#LI-SW1 #LI-ONSITE
group id: 10430981