Systems Administrator/Operator - ISC2/NISSC Internet & Ecommerce - Colorado Springs, CO at Geebo

Systems Administrator/Operator - ISC2/NISSC

Company Name:
ClearedPath
Job Title : Systems Administrator/Operator (ISC2/NISSC)

Experience: Associate to Senior
Job Type : Full time
Location : Colorado Springs, CO
The North American Aerospace Defense Command (NORAD) Cheyenne Mountain Complex - Integrated Tactical Warning/Attack Assessment (NCMC-ITW/AA) Program provides ITW/AA authorities with accurate, timely and unambiguous warning and attack assessment of air, missile and space threats. Within the Program, the NCMC-ITW/AA system provides Combatant Commanders comprehensive command and control (C2) information, capabilities and tools to support Air, Space and Missile Warning missions located at Cheyenne Mountain Air Force Station (AFS), Peterson Air Force Base (AFB), Offutt AFB, Vandenberg AFB, Washington D.C. area, Forward User and Sensor sites worldwide.
BANC3 is providing support to the North American Aerospace Defense Command (NORAD) Cheyenne Mountain Complex (NCMC) - Integrated Tactical Warning/Attack Assessment (NCMC-ITW/AA) And Space Support Contract (NISSC) Program. BANC3 will sustain and upgrade hardware and software through a technology refresh, maintain network and system requirements, and provide integrated management among all required tasks.
Job Description
Maintains smooth operation of multi-user computer systems, including coordination with network administrators.
Duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocate mass storage space.
Interacts with users and evaluates vendor products.
Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery.
Develops and monitors policies and standards for allocation related to the use of computing resources.
Supervises and manages the daily activities of configuration and operation of business/computer systems
Optimizes system operations and resource utilization and performs system capacity analysis and planning
Provides assistance to users in accessing and using business/computer systems.
Monitors and supports computer processing
Coordinates input, output, and file media
Distributes output and controls computer operation
Supervises and performs data entry tasks, maintain all data fields in associated systems, in accordance with all regulations, system technical manuals, and local client site regulations, business practices, policies and procedures
Required Skills
BA/BS in Computer Science, Information Technology, Computer Engineering, Mathematics, or related field, with 2-3 years (Associate), 4-6 (Journeyman), 7
(Senior) experience
Must be capable of managing the servers, which typically involves installing, upgrading, and troubleshooting any problems with the systems.
Must have experience working with Unix, Linux, or Windows operating systems.
Must be compliant with Department of Defense Directive 8570 (DoDD 8570) Baseline Certification - IAT Level I minimum
Knowledge of TCP/IP fundamentals (DNS, DHCP, FTP, SSH, IP CONFIG) is desired
Must provide the essential software support for the laptops, desktop personal computers, and printers, including the configuration of the hardware devices, testing new software and designing the structure of the network.
Must be capable of testing the operating system software, the networking software and also the computer hardware.
Working knowledge of the oracle Solaris 10/11 Operating System, Windows 2003/2008, Vmware Vcenter Server 4. 1.0.
DoD Top Secret clearanceEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.