IdM Platform Administrator at Leidos
Odenton, MD 21113, USA -
Full Time


Start Date

Immediate

Expiry Date

16 Oct, 25

Salary

85150.0

Posted On

17 Jul, 25

Experience

4 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Powershell, Java, Artifacts, Security Tools, Sql Server, Osi Model, Bash, Perl, Firewalls

Industry

Information Technology/IT

Description

Description
Leidos is seeking an IdM Platform / *nix Platform Administrator to join our team at Ft. Meade, MD. In this role you will provide security infrastructure operations support and interfacing across the program. This support includes identity management cybersecurity solutions and related technologies. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.

BASIC QUALIFICATIONS:

  • Bachelor’s degree and 4+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
  • Must have a DoD IAT Level II certification at start date (e.g. Sec+)
  • Experience operating and maintaining a variety of security tools functioning to support a strong cybersecurity posture and deliver cybersecurity related services, including developing and maintaining all related documentation and artifacts, with a focus in IAM/IdM tools.
  • Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps.
  • Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes.
  • Understanding of federal cybersecurity guidance.
  • Experience with Solaris OS and Oracle Unified Directory
  • Understand networking concepts such as firewalls, service ports, and the OSI model
  • Have knowledge of: Apache HTTPD, Microsoft IIS, Apache Tomcat, Oracle RDBMS, MS SQL Server, Oracle Server Directory, Microsoft AD, Bash, Java, Perl, and Powershell

PREFERRED QUALIFICATIONS:

  • Cybersecurity tool integration experience..
  • IAM/IdM certifications.
  • Experience hardening systems and applications.
  • Additional certifications demonstrating cybersecurity/technical mastery in other areas, including areas noted in basic qualifications.
  • Solaris Administration within a Sailpoint IdM implementation.
Responsibilities
  • Operate and maintain integration and implementation of Identity Management, Access Control Systems/Solutions, support Compliance Monitoring and Remediation, and implement Multi-Factor Authentication (MFA) and/or single sign-on (SSO) solutions as required in addition to other possible cybersecurity and/or cyber operations tools and solutions IAW DoDI 8520.02, DoDI 8520.03, and other applicable policies and regulations.
  • Operate and maintain security solutions and related technologies for clients.
  • Administering Linux (Solaris) and Windows
  • Administering Oracle Unified Directory (OUD)
  • Interface with information assurance personnel and support cybersecurity efforts across the program.
  • Support Authorizing Official (AO) actions by providing supporting documents and artifacts for various security tools in accordance with RMF as defined in NIST 800-37 revision 2 and related agency specific RMF requirements.
  • Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation and authorization against AU (Audit and Accountability) family controls per NIST SP 800-53 guidance.
  • Provide input to and guide implementation and/or verification and validation of an organizational access control policy and plan reflecting various cybersecurity solutions in compliance with risk-levels defined in the National Institute of Standards and Technology (NIST) 800-53, rev 4, Access Control family of controls to include auditing annually, at a minimum.
  • Operate integrated solutions and refine operational processes and procedures for evaluating, monitoring, remediating, and/or documenting information system security vulnerabilities and/or security incidents.
  • Review and recommend updates to existing security tools, policies, and/or procedures.
Loading...