- Hourly / - BiWeekly /
- Monthly / $89,913.00-$145,151.00 Yearly
SKILLED SERVICE BARGAINING UNIT: G NCP
A Department of Information Technology (DoIT) Cybersecurity
Systems Administrator II is the full performance level of work performing
day-to-day management of the tools and systems that support security operations
in the Office of Security Management (OSM). Employees in this classification do
not supervise.
Employees
in this classification receive general supervision from the Director of
Security Operations or another designated administrator.
Positions
in this classification are evaluated using the Classification Job Evaluation
Methodology. The use of this method involves comparing the assigned duties and
responsibilities of a position to the job criteria found in the Nature of Work
and Examples of Work sections of a class specification.
This
position may require work outside of regular business hours, and work in an
on-call capacity.
The DoIT Cybersecurity Systems Administrator I
and DoIT Cybersecurity Systems Administrator II are differentiated on the basis
of supervisory control by the supervisor over these employees. The DoIT Cybersecurity
Systems Administrator I perform duties under close supervision at times and
under general supervision at other times depending on the complexity of the
specific duty being performed, and the Doit Cybersecurity Systems Administrator
II performs the full range of duties under general supervision. The DoIT Cybersecurity
Systems Administrator II is differentiated from the DoIT Cybersecurity Systems
Administrator, Lead/Advanced in that the DoIT Cybersecurity Systems
Administrator, Lead/Advanced assigns, reviews and approves the work of and
trains lower-level DoIT Cybersecurity Systems Administrators or serves
as a project lead or addresses the most complex
tasks and escalated issues, prior to engaging a higher-level IT manager or
director.
Conducts functional and
connectivity testing to ensure continuing operability;
Designs group policies and access control lists
to ensure compatibility with organizational standards, business rules, and
needs;
Develops and documents
systems administration standard operating procedures;
Maintains baseline system security according to
organizational policies;
Manages accounts, network rights, and access to
systems and equipment;
Plans, executes, and verifies data redundancy
and system recovery procedures;
Provides ongoing optimization and
problem-solving support;
Installs, updates, and troubleshoots
systems/servers;
Check’s system hardware availability,
functionality, integrity, and efficiency;
Conducts periodic system maintenance including
cleaning (both physically and electronically), disk checks, routine reboots,
data dumps, and testing;
Complies with organization systems
administration standard operating procedures;
Implements and enforces local network usage
policies and procedures;
Manages system/server resources including
performance, capacity, availability, serviceability, and recoverability;
Monitors and maintains system/server
configuration;
Oversees installation, implementation,
configuration, and support of system components;
Diagnoses faulty system/server hardware;
Performs repairs on faulty system/server
hardware;
Troubleshoots hardware/software interface and
interoperability problems;
Performs
other related duties.
Knowledge of
computer networking concepts and protocols, and network security methodologies;
Knowledge of risk management processes (e.g., methods for assessing and
mitigating risk); Knowledge of laws, regulations, policies, and ethics as they
relate to cybersecurity and privacy; Knowledge of cybersecurity and privacy
principles; Knowledge of cyber threats and vulnerabilities; Knowledge of
specific operational impacts of cybersecurity lapses; Knowledge of information
technology (IT) security principles and methods (e.g., firewalls, demilitarized
zones, encryption); Knowledge of local area and wide area networking principles
and concepts including bandwidth management; Knowledge of measures or
indicators of system performance and availability; Knowledge of performance
tuning tools and techniques; Knowledge of server and client operating systems; Knowledge
of systems administration concepts; Knowledge of the enterprise information
technology (IT) architecture; Knowledge of the type and frequency of routine
hardware maintenance; Knowledge of Virtual Private Network (VPN) security; Knowledge
of file system implementations (e.g., New Technology File System [NTFS], File
Allocation Table [FAT], File Extension [EXT]); Knowledge of virtualization
technologies and virtual machine development and maintenance; Knowledge of
organizational information technology (IT) user security policies (e.g.,
account creation, password rules, access control); Knowledge of system
administration, network, and operating system hardening techniques; Knowledge
of network security architecture concepts including topology, protocols,
components, and principles (e.g., application of defense-in-depth); Knowledge
of Personally Identifiable Information (PII) data security standards; Knowledge
of Payment Card Industry (PCI) data security standards; Knowledge of Personal
Health Information (PHI) data security standards; Knowledge of transmission
records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared
Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes,
Voice over Internet Protocol (VoIP)), and jamming techniques that enable
transmission of undesirable information, or prevent installed systems from
operating correctly; Knowledge of systems engineering theories, concepts, and
methods; Knowledge of system/server diagnostic tools and fault identification
techniques; Knowledge of operating system command-line tools; Knowledge of
network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System
(DNS), and directory services; Knowledge of principles and methods for
integrating system components.
Skill in configuring
and optimizing software; Skill in diagnosing connectivity problems; Skill in
maintaining directory services. (e.g., Microsoft Active Directory, LDAP, etc.);
Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere,
Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.); Skill in
configuring and utilizing software-based computer protection tools (e.g.,
software firewalls, antivirus software, anti-spyware); Skill in interfacing
with customers; Skill in conducting system/server planning, management, and
maintenance; Skill in correcting physical and technical problems that impact
system/server performance; Skill in troubleshooting failed system components
(i.e., servers); Skill in identifying and anticipating system/server
performance, availability, capacity, or configuration problems; Skill in
installing system and component upgrades. (i.e., servers, appliances, network
devices); Skill in monitoring and optimizing system/server performance; Skill
in recovering failed systems/servers. (e.g., recovery software, failover
clusters, replication, etc.); Skill in operating system administration. (e.g.,
account maintenance, data backups, maintain system performance, install and
configure new hardware/software).
Ability to
conduct a comprehensive assessment of the management, operational, and
technical security controls and control enhancements employed within or
inherited by a system to determine the effectiveness of the controls (i.e., the
extent to which the security controls are implemented correctly, operating as
intended, and producing the desired outcome with respect to meeting the security
requirements for the system); Ability to ensure that functional and security
requirements are appropriately addressed in a contract and that the contractor
meets the functional and security requirements as stated in the contract.
Experience: Nine years of experience in an IT position with primary responsibility that includes network management, server management, or security operations. At least one year of specialized experience managing specific security tools and systems.
Notes:
1. Candidates may substitute a bachelor’s degree in computer science, cybersecurity, information technology, software engineering, information systems, computer engineering or related field for up to four years of the required experience.
2. Candidates may substitute the “Education” requirement listed above, for a High School Diploma or possession of a High School Equivalency certificate and two additional years of experience as described above.
3. Candidates may substitute the “Experience” requirement listed above for a graduate level degree in Computer science, cybersecurity, information technology, software engineering, information systems, and computer engineering or related field.
Must have an Information
Assurance Technical (IAT) level 2 or higher certification and a
certification associated with the methodologies and processes as described on
the Maryland Department of Information Technology website.
Employees in this classification may be subject to
call-in 24 hours a day and, therefore, may be required to provide the employing
agency with a telephone number where the employee can be reached. Employees may
be furnished with a pager or cell phone.
Applicants for this classification may handle sensitive
data. This will require a full scope background investigation prior to
appointment. A criminal conviction may be grounds for rejection of the
applicant.
Employees may occasionally be required to travel to field
locations and must have access to an automobile in the event a state vehicle
cannot be provided. Standard mileage allowance will be paid for use of a
privately owned vehicle.
Director, Division of
Classification and Salary