Posted today
Top Secret
Unspecified
Unspecified
IT - Hardware
Fort Huachuca, AZ (On-Site/Office)
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1373
Job Title: Telecommunications Specialist
Location: Fort Huachuca
Clearance Level: Top Secret SCI
Required Certification(s): CISSP or RHCSA
SUMMARY
Manages the daily activities of configuration and operation of the organization's IT systems and applications. Assists in the installation, maintenance, and general support of IT systems. Identifies and resolves problems associated with operating systems. Analyzes and resolves problems associated with server hardware/software and applications software. Detects, diagnoses, and reports related problems on both server, desktop, and mobile IT systems. Assists users with questions or issues related to accessing and using IT systems. Installs new software releases and system upgrades, evaluates and installs patches, and resolves software related problems.
Performs system backup and recovery procedures. Maintains data files and monitors system configuration to ensure data integrity. Performs system capacity analysis and planning, and optimizes system operation and resource utilization. Develops and implements policies and procedures to ensure that systems support the organization's business requirements and meet the needs of end users. Defines system requirements based on user/client needs, cost, scalability, and required integration with existing applications, systems, or platforms.
JOB DUTIES AND RESPONSIBILITIES
Perform the administration of the information systems and applications used to establish, distribute and protect, the unclassified, (NIPRNet, DREN, CFBLNet, Office of Secretary of Defense (OSD) Waivered Commercial Internet Service (CISP)), DoD Collateral Classified and Releasable (REL) Mission Partner network domains and communities of interest, (SIPRNet, SDREN, North American Treaty Organization (NATO), Five Eyes Alliance (FVEY)) data and VoIP services to the respective test lab, servers, and end-point workstations. Contractor shall perform system administration for Windows and Linux operating systems; ESXi: VMware and MS Hypervisor virtualization; Active Directory, Domain Name Service (DNS), web, Endpoint Security Solutions (ESS), Assured Compliance Assessment Solution (ACAS), database, email, collaborative tools, associated approved applications, test tools and services. The Contractor shall conduct System Administration (SA) for both physical and virtual servers, zero clients, thin clients, and physical end-point workstations.
Perform system administration of the information systems that establish the JITC Fort Huachuca, AZ instance of the Joint Worldwide Intelligence Communication System (JWICS). Contractor shall perform system administration of the systems and applications applied to this enclave and encompassed in Task 6.1 and with respect to the distinctive guidance established within the JWICS Security Classification Guide (SCG), respective Directives and Issuances from DISA, the Director National Intelligence (DNI) and the Defense intelligence Agency (DIA).
Perform; routine audits of systems and software, system backup, archive and restore procedures, installation and configuration of new hardware and software, and the application of operating system updates, patches, and configuration changes, as directed by the U.S. DoD U.S. Cyber Command (US CYBERCOM) Information Assurance Vulnerability Management (IAVM) Program, Information Assurance Vulnerability Alerts (IAVA), Security Technical Implementation Guide (STIG) / Security Requirements Guide (SRG), Bulletins, and Technical Advisory (TA) issuances. Contractor will initiate respective system STIG checklists periodically as prescribed within the Authority to Operate (ATO) or as directed by the JITC Command ISSM. The Contractor shall accomplish JITC Property accountability as part of the daily routine and may be appointed as a JITC
Property Book Sub-hand receipt holder that will encompass the conduct of monthly 10% and annual 100% inventories.
Perform the sustainment and configuration of the information system that each respective application resides; ACAS and ESS/ePolicy Orchestrator (ePO) and perform the configuration and application updates; aid with application deployment and assistance to Endpoint SA groups and Cybersecurity Team.
Use the designated IT Service Management system for all system sustainment and change actions that require approval by JITC Cybersecurity. The few exceptions are declared in the DISA RME issued ISSM Checklist. Most change actions will require Cybersecurity approval. Approved changes will be documented in an update to the Standing Operating Procedures (SOP) and the Cybersecurity Architecture Descriptions (CAD) documents and any Network Topology diagrams. The Contractor shall request access the to the DISA Direct Store Front (DDSF) to then request the Authorized Requesting Official (ARO) role. This role will establish the ability to process Telecommunications Service Requests (TSR) to facilitate changes to any DODIN Services connected to the JITC FHU Network Enclaves.
QUALIFICATIONS
Recommended Certifications
Sec +, Server +, CISSP, RHCSA
Education, Background, and Years of Experience
Requires a Master's degree; or a Bachelor's degree with at least 4 years of experience; or an Associate's and at least 6 years of experience. One year of experience can be substituted by 15 semester hours completed towards a Master's degree. Additional certifications (other than those required for the position) in the area of specialization be substituted for experience but varies by certification. The degree must be in a relevant technical curriculum and experience must be related to the job duties.
ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills
Demonstrates expertise in a variety of systems administration concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of complex tasks. A wide degree of creativity and latitude is expected. Leads and directs the work of others. Typically reports to department management or executive. May provide consultation on complex projects and be a top-level contributor/specialist in the department. Must be an expert at problem solving, identifying risk, and communicating results and recommendations to department management.
Preferred Skills
Perform the administration of the information systems and applications used to establish, distribute and protect, the unclassified, (NIPRNet, DREN, CFBLNet, Office of Secretary of Defense (OSD) Waivered Commercial Internet Service (CISP)), DoD Collateral Classified and Releasable (REL) Mission Partner network domains and communities of interest, (SIPRNet, SDREN, North American Treaty Organization (NATO), Five Eyes Alliance (FVEY)) data and VoIP services to the respective test lab, servers, and end-point workstations. Contractor shall perform system administration for Windows and Linux operating systems; ESXi: VMware and MS Hypervisor virtualization; Active Directory, Domain Name Service (DNS), web, Endpoint Security Solutions (ESS), Assured Compliance Assessment Solution (ACAS), database, email, collaborative tools, associated approved applications, test tools and services. The Contractor shall conduct System Administration (SA) for both physical and virtual servers, zero clients, thin clients, and physical end-point workstations.
Perform system administration of the information systems that establish the JITC Fort Huachuca, AZ instance of the Joint Worldwide Intelligence Communication System (JWICS). Contractor shall perform system administration of the systems and applications applied to this enclave and encompassed in Task 6.1 and with respect to the distinctive guidance established within the JWICS Security Classification Guide (SCG), respective Directives and Issuances from DISA, the Director National Intelligence (DNI) and the Defense intelligence Agency (DIA).
WORKING CONDITIONS
Environmental Conditions
Indoor atmosphere
Strength Demands
Minimal possible occasional lift requirements
Physical Requirements
Sit, stand, climb stairs, repetitive motion
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1373
Job Title: Telecommunications Specialist
Location: Fort Huachuca
Clearance Level: Top Secret SCI
Required Certification(s): CISSP or RHCSA
SUMMARY
Manages the daily activities of configuration and operation of the organization's IT systems and applications. Assists in the installation, maintenance, and general support of IT systems. Identifies and resolves problems associated with operating systems. Analyzes and resolves problems associated with server hardware/software and applications software. Detects, diagnoses, and reports related problems on both server, desktop, and mobile IT systems. Assists users with questions or issues related to accessing and using IT systems. Installs new software releases and system upgrades, evaluates and installs patches, and resolves software related problems.
Performs system backup and recovery procedures. Maintains data files and monitors system configuration to ensure data integrity. Performs system capacity analysis and planning, and optimizes system operation and resource utilization. Develops and implements policies and procedures to ensure that systems support the organization's business requirements and meet the needs of end users. Defines system requirements based on user/client needs, cost, scalability, and required integration with existing applications, systems, or platforms.
JOB DUTIES AND RESPONSIBILITIES
Perform the administration of the information systems and applications used to establish, distribute and protect, the unclassified, (NIPRNet, DREN, CFBLNet, Office of Secretary of Defense (OSD) Waivered Commercial Internet Service (CISP)), DoD Collateral Classified and Releasable (REL) Mission Partner network domains and communities of interest, (SIPRNet, SDREN, North American Treaty Organization (NATO), Five Eyes Alliance (FVEY)) data and VoIP services to the respective test lab, servers, and end-point workstations. Contractor shall perform system administration for Windows and Linux operating systems; ESXi: VMware and MS Hypervisor virtualization; Active Directory, Domain Name Service (DNS), web, Endpoint Security Solutions (ESS), Assured Compliance Assessment Solution (ACAS), database, email, collaborative tools, associated approved applications, test tools and services. The Contractor shall conduct System Administration (SA) for both physical and virtual servers, zero clients, thin clients, and physical end-point workstations.
Perform system administration of the information systems that establish the JITC Fort Huachuca, AZ instance of the Joint Worldwide Intelligence Communication System (JWICS). Contractor shall perform system administration of the systems and applications applied to this enclave and encompassed in Task 6.1 and with respect to the distinctive guidance established within the JWICS Security Classification Guide (SCG), respective Directives and Issuances from DISA, the Director National Intelligence (DNI) and the Defense intelligence Agency (DIA).
Perform; routine audits of systems and software, system backup, archive and restore procedures, installation and configuration of new hardware and software, and the application of operating system updates, patches, and configuration changes, as directed by the U.S. DoD U.S. Cyber Command (US CYBERCOM) Information Assurance Vulnerability Management (IAVM) Program, Information Assurance Vulnerability Alerts (IAVA), Security Technical Implementation Guide (STIG) / Security Requirements Guide (SRG), Bulletins, and Technical Advisory (TA) issuances. Contractor will initiate respective system STIG checklists periodically as prescribed within the Authority to Operate (ATO) or as directed by the JITC Command ISSM. The Contractor shall accomplish JITC Property accountability as part of the daily routine and may be appointed as a JITC
Property Book Sub-hand receipt holder that will encompass the conduct of monthly 10% and annual 100% inventories.
Perform the sustainment and configuration of the information system that each respective application resides; ACAS and ESS/ePolicy Orchestrator (ePO) and perform the configuration and application updates; aid with application deployment and assistance to Endpoint SA groups and Cybersecurity Team.
Use the designated IT Service Management system for all system sustainment and change actions that require approval by JITC Cybersecurity. The few exceptions are declared in the DISA RME issued ISSM Checklist. Most change actions will require Cybersecurity approval. Approved changes will be documented in an update to the Standing Operating Procedures (SOP) and the Cybersecurity Architecture Descriptions (CAD) documents and any Network Topology diagrams. The Contractor shall request access the to the DISA Direct Store Front (DDSF) to then request the Authorized Requesting Official (ARO) role. This role will establish the ability to process Telecommunications Service Requests (TSR) to facilitate changes to any DODIN Services connected to the JITC FHU Network Enclaves.
QUALIFICATIONS
Recommended Certifications
Sec +, Server +, CISSP, RHCSA
Education, Background, and Years of Experience
Requires a Master's degree; or a Bachelor's degree with at least 4 years of experience; or an Associate's and at least 6 years of experience. One year of experience can be substituted by 15 semester hours completed towards a Master's degree. Additional certifications (other than those required for the position) in the area of specialization be substituted for experience but varies by certification. The degree must be in a relevant technical curriculum and experience must be related to the job duties.
ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills
Demonstrates expertise in a variety of systems administration concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of complex tasks. A wide degree of creativity and latitude is expected. Leads and directs the work of others. Typically reports to department management or executive. May provide consultation on complex projects and be a top-level contributor/specialist in the department. Must be an expert at problem solving, identifying risk, and communicating results and recommendations to department management.
Preferred Skills
Perform the administration of the information systems and applications used to establish, distribute and protect, the unclassified, (NIPRNet, DREN, CFBLNet, Office of Secretary of Defense (OSD) Waivered Commercial Internet Service (CISP)), DoD Collateral Classified and Releasable (REL) Mission Partner network domains and communities of interest, (SIPRNet, SDREN, North American Treaty Organization (NATO), Five Eyes Alliance (FVEY)) data and VoIP services to the respective test lab, servers, and end-point workstations. Contractor shall perform system administration for Windows and Linux operating systems; ESXi: VMware and MS Hypervisor virtualization; Active Directory, Domain Name Service (DNS), web, Endpoint Security Solutions (ESS), Assured Compliance Assessment Solution (ACAS), database, email, collaborative tools, associated approved applications, test tools and services. The Contractor shall conduct System Administration (SA) for both physical and virtual servers, zero clients, thin clients, and physical end-point workstations.
Perform system administration of the information systems that establish the JITC Fort Huachuca, AZ instance of the Joint Worldwide Intelligence Communication System (JWICS). Contractor shall perform system administration of the systems and applications applied to this enclave and encompassed in Task 6.1 and with respect to the distinctive guidance established within the JWICS Security Classification Guide (SCG), respective Directives and Issuances from DISA, the Director National Intelligence (DNI) and the Defense intelligence Agency (DIA).
WORKING CONDITIONS
Environmental Conditions
Indoor atmosphere
Strength Demands
Minimal possible occasional lift requirements
Physical Requirements
Sit, stand, climb stairs, repetitive motion
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
group id: 10180220