- Hourly / - BiWeekly /
- Monthly / $78,919.00-$127,473.00 Yearly
SKILLED SERVICE BARGAINING UNIT: G NCP
A Department of Information Technology (DoIT) Cybersecurity
Systems Administrator I is the intermediate level of work performing day-to-day
management of the tools and systems that support security operations in the
Office of Security Management (OSM). Employees in this classification do not
supervise.
Employees
in this classification receive moderate supervision from the Director of
Security Operations or another designated IT administrator.
Positions
in this classification are evaluated using the Classification Job Evaluation
Methodology. The use of this method involves comparing the assigned duties and
responsibilities of a position to the job criteria found in the Nature of Work
and Examples of Work sections of a class specification.
This
position may require work outside of regular business hours, and work in an
on-call capacity.
The DoIT Cybersecurity
Systems Administrator I and DoIT Cybersecurity Systems Administrator II are
differentiated on the basis of supervisory control by the supervisor over these
employees. The DoIT Cybersecurity Systems Administrator I perform duties under
close supervision at times and under general supervision at other times
depending on the complexity of the specific duty being performed, and the DoIT Cybersecurity
Systems Administrator II performs the full range of duties under general
supervision.
Conducts functional and
connectivity testing to ensure continuing operability;
Designs group policies and access control lists
to ensure compatibility with organizational standards, business rules, and
needs;
Develops and document
systems administration standard operating procedures;
Maintains baseline system security according to
organizational policies;
Manages accounts, network rights, and access to
systems and equipment;
Plans, executes, and verifies data redundancy
and system recovery procedures;
Provides ongoing optimization and
problem-solving support;
Installs, updates, and troubleshoots
systems/servers;
Checks system hardware availability,
functionality, integrity, and efficiency.
Conducts periodic system maintenance including
cleaning (both physically and electronically), disk checks, routine reboots,
data dumps, and testing;
Complies with organization systems
administration standard operating procedures;
Implements and enforces local network usage
policies and procedures;
Manages system/server resources including
performance, capacity, availability, serviceability, and recoverability;
Monitors and maintains system/server
configuration;
Oversees installation, implementation,
configuration, and support of system components;
Diagnoses faulty system/server hardware;
Performs repairs on faulty system/server
hardware;
Troubleshoots hardware/software interface and
interoperability problems;
Performs
other related duties.
Knowledge of
computer networking concepts and protocols, and network security methodologies;
Knowledge of risk management processes (e.g., methods for assessing and
mitigating risk); Knowledge of laws, regulations, policies, and ethics as they
relate to cybersecurity and privacy; Knowledge of cybersecurity and privacy
principles; Knowledge of cyber threats and vulnerabilities; Knowledge of
specific operational impacts of cybersecurity lapses; Knowledge of information
technology (IT) security principles and methods (e.g., firewalls, demilitarized
zones, encryption); Knowledge of local area and wide area networking principles
and concepts including bandwidth management; Knowledge of measures or
indicators of system performance and availability; Knowledge of performance
tuning tools and techniques; Knowledge of server and client operating systems; Knowledge
of systems administration concepts; Knowledge of the enterprise information
technology (IT) architecture; Knowledge of the type and frequency of routine
hardware maintenance; Knowledge of Virtual Private Network (VPN) security; Knowledge
of file system implementations (e.g., New Technology File System [NTFS], File
Allocation Table [FAT], File Extension [EXT]); Knowledge of virtualization
technologies and virtual machine development and maintenance; Knowledge of
organizational information technology (IT) user security policies (e.g.,
account creation, password rules, access control); Knowledge of system administration,
network, and operating system hardening techniques; Knowledge of network
security architecture concepts including topology, protocols, components, and
principles (e.g., application of defense-in-depth); Knowledge of Personally
Identifiable Information (PII) data security standards; Knowledge of Payment
Card Industry (PCI) data security standards; Knowledge of Personal Health
Information (PHI) data security standards; Knowledge of transmission records
(e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking
(IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over
Internet Protocol (VoIP)), and jamming techniques that enable transmission of
undesirable information, or prevent installed systems from operating correctly;
Knowledge of systems engineering theories, concepts, and methods; Knowledge of
system/server diagnostic tools and fault identification techniques; Knowledge
of operating system command-line tools; Knowledge of network protocols such as
TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory
services; Knowledge of principles and methods for integrating system
components.
Skill in configuring
and optimizing software; Skill in diagnosing connectivity problems; Skill in
maintaining directory services. (e.g., Microsoft Active Directory, Lightweight directory access protocol (LDAP), etc.); Skill
in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix
XenDesktop/Server, Amazon Elastic Compute Cloud, etc.); Skill in configuring
and utilizing software-based computer protection tools (e.g., software
firewalls, antivirus software, anti-spyware); Skill in interfacing with
customers; Skill in conducting system/server planning, management, and
maintenance; Skill in correcting physical and technical problems that impact
system/server performance; Skill in troubleshooting failed system components
(i.e., servers); Skill in identifying and anticipating system/server
performance, availability, capacity, or configuration problems; Skill in
installing system and component upgrades. (i.e., servers, appliances, network
devices); Skill in monitoring and optimizing system/server performance; Skill
in recovering failed systems/servers. (e.g., recovery software, failover
clusters, replication, etc.); Skill in operating system administration. (e.g.,
account maintenance, data backups, maintain system performance, install and
configure new hardware/software).
Ability to
conduct a comprehensive assessment of the management, operational, and
technical security controls and control enhancements employed within or
inherited by a system to determine the effectiveness of the controls (i.e., the
extent to which the security controls are implemented correctly, operating as
intended, and producing the desired outcome with respect to meeting the security
requirements for the system); Ability to ensure that functional and security
requirements are appropriately addressed in a contract and that the contractor
meets the functional and security requirements as stated in the contract.
Experience: Six years of experience in an IT position with primary responsibility that includes network management, server management, or security operations. At least one year of specialized experience managing specific security tools and systems.
Notes:
1. Candidates may substitute a bachelor’s degree in computer science, cybersecurity, information technology, software engineering, information systems, computer engineering or related field for up to four years of the required experience.
2. Candidates may substitute the “Education” requirement
listed above, for a High School Diploma or possession of a High School
Equivalency certificate and two additional years of experience as described
above.
3. Candidates may substitute the “Experience” requirement
listed above for a graduate level degree in Computer science, cybersecurity, information
technology, software engineering, information systems, and computer engineering
or
related field.
Must have an Information
Assurance Technical (IAT) level 2 or higher certification and a
certification associated with the methodologies and processes as described on
the Maryland Department of Information Technology website.
Employees in this classification may be subject to
call-in 24 hours a day and, therefore, may be required to provide the employing
agency with a telephone number where the employee can be reached. Employees may
be furnished with a pager or cell phone.
Applicants for this classification may handle sensitive
data. This will require a full scope background investigation prior to
appointment. A criminal conviction may be grounds for rejection of the
applicant.
Employees may occasionally be required to travel to field
locations and must have access to an automobile in the event a state vehicle
cannot be provided. Standard mileage allowance will be paid for use of a
privately owned vehicle.
July 1, 2021
Director, Division of
Classification and Salary