What are the responsibilities and job description for the Windows Systems Admin - VIPR position at BCforward?
Job Details
Windows Systems Admin - VIPR
BCforward is seeking a Windows Systems Admin to work remote
Must be eligible to obtain Security Clearance
Windows VIPR (Vulnerability & Incident Prevention/Response)
Candidate will be responsible for downloading, distributing, and deploying Microsoft and other third-party patches on a strict maintenance schedule. Candidate should be able to understand existing PowerShell scripts. Candidate should be comfortable with SCCM infrastructure, understanding client logs, and remediating client communication issues. Candidate will be responsible for implementing and maintaining baselines - especially DISA STIGs. They will need to be able to isolate GPO settings during troubleshooting. Candidate will utilize ServiceNow to track Vulnerable Items and identify a resolution path. Candidate will assist with troubleshooting during outages.
* Experienced (3 years) Windows System Administration position.
* Core work hours are 9AM - 5PM ET with monthly patching 1-2x/month from 8P - 4A. Off-hours flexibility is required to accommodate business requirements.
* On-call rotation is every 4-5 weeks for 1 week, and 1 week as secondary.
1. Systems Administration
a. Patching and vulnerability management.
b. Basic Active Directory administration.
c. Develop, implement, and maintain Group Policy Objects (GPOs), especially STIGs.
d. Utilize automated scripts for configuring settings on OS Windows 2012, 2016 and 2019 servers using an iterative process.
e. Coordinate with project team, server/patching teams and application teams to schedule deployments in non-production and production.
f. Assist application teams in troubleshooting, root cause analysis and resolution of any issues during testing/validation and post-production patching. Revise configurations and redeploy as needed.
g. Use scan results to assess configuration success.
h. Modify GPOs for specific applications as needed and coordinate deployment of required GPOs to servers using Active Directory.
2. Project Management
a. Work with existing support teams to develop understanding of our infrastructure environment and applications.
b. Utilize existing change management processes to execute assigned tasks and deliver solutions on schedule.
c. Provide relevant updates and communicate obstacles to management.
3. Documentation
a. Compose commentary to explain any required deviation from STIGs or scan false positives using required forms.
b. Gather and append evidence to support explanations for deviations or false positives.
c. Submit forms using established processes.
d. Verbally support submitted or pending explanations to senior management and application teams if required.
Minimum Requirements:
1. 3 years Windows system admin experience.
2. Vulnerability management/remediation experience that includes analyzing scanning output and assessing required changes.
3. Experience with server hardening procedures (STIG, CIS Standards, various agency SCSEM's) including building/modifying/deploying GPOs.
4. Familiarity with Active Directory and Windows user access procedures.
5. Understanding of corporate level change and release management processes.
6. Ability to clearly articulate rationale for deviations in simple language that can be understood by auditors and other non-technical staff.
7. Experience with server automation products (SCCM, SCOM) and/or creating scripts (Powershell) to facilitate automated changes.
Preferred Experience:
1. Experience with Tenable Nessus scan output and ServiceNow's Security Operations Module (Vulnerability Response).
2. Experience with ServiceNow IT Service Management.
3. Experience with audit requirements relative to multiple government agencies (DOD, ED, Treasury, IRS) a plus.
4. Bachelor's Degree in IT or Security related discipline.
Interested candidates please send resume in Word format Please reference job code 222111 when responding to this ad.