System Administrator at Amentum
Washington, District of Columbia, USA -
Full Time


Start Date

Immediate

Expiry Date

07 Nov, 25

Salary

140000.0

Posted On

08 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Security Audits, Information Systems, Computer Science, Information Security, Milestones, Communication Skills, Training Programs, Vulnerability Assessment, Software, Vulnerability, Regulations, Collaboration, Emerging Technologies, Remediation, Troubleshooting

Industry

Information Technology/IT

Description

At Amentum , we recognize that strong, secure, and reliable IT infrastructure is the foundation of every successful organization. We’re offering a career opportunity for a System Administrator who is passionate about optimizing systems, driving operational efficiency, and safeguarding digital environments. This role is critical to our mission-ensuring our teams have the tools and support they need to perform at their best. We’re looking for someone who brings not only technical expertise but also a proactive mindset, a commitment to continuous improvement, and a desire to grow with a purpose-driven company. If you’re ready to make a meaningful impact through technology, we invite you to join us and help shape the future of our IT landscape.

If you’re ready to start your career with purpose - using your skills to support the people and technologies that protect our nation - Amentum is where your impact begins.

  • Review and Update Information Security Requirements:
  • Review the current information security policies and procedures.
  • Update security requirements for IT assets and resources to ensure they are protected against current and evolving threats.
  • Document any changes and ensure compliance with DoD security policies.
  • Vulnerability Assessment and Remediation:
  • Conduct vulnerability assessments on systems and networks.
  • Identify and document any vulnerabilities found.
  • Develop and implement POAMs (Plan of Actionable and Milestones) for remediation of identified vulnerabilities.
  • Technical Support and Troubleshooting:
  • Provide technical expertise and support to resolve customer problems.
  • Utilize prior experience and understanding of how products and services interrelate to recommend effective solutions.
  • Afternoon Tasks:
  • Implementation of Information Assurance (IA) Products:
  • Support the implementation of IA-related products and services for both current and new initiatives.
  • Ensure that existing IA products are integrated with new hardware and software introduced to the network.
  • Document all activities, findings, and recommendations from the day’s work.
  • Prepare reports for management and stakeholders on the status of security initiatives, vulnerability assessments, and remediation efforts.
  • Continuous Learning and Development:
  • Stay updated with the latest trends, technologies, and best practices in information security and emerging technologies.
  • Participate in training programs or webinars to enhance your skills and knowledge.
  • Collaboration and Coordination:
  • Work closely with other IT professionals, stakeholders, and management to ensure alignment with organizational goals.
  • Participate in team meetings and discussions to share insights and seek input on complex issues.
  • Ensure that all IT assets and resources are compliant with relevant security standards and regulations.
  • Prepare for and assist with security audits and assessments.
  • By following this daily task list, the IT Specialist III Mid can effectively manage their responsibilities, ensure the security and integrity of IT assets, and provide valuable support to the organization.

REQUIREMENTS:

  • Strong attention to detail, organization, and communication skills (both written and verbal).
  • Ability to multi-task and prioritize effectively in a fast-paced environment.
  • Demonstrated ability to learn new systems and tools quickly.
    Clearance Required: TS SCI CI-Poly
    Minimum Education: Bachelor’s degree in Computer Science, Information Systems, Engineering, Business, or other related discipline with ten (10) years of which at least seven (7) years specialized experience.
    Minimum Years of Experience: Related discipline with five (5) years
    Required Certifications: 8570 CompTIA Security +
Responsibilities
  • Review and Update Information Security Requirements:
  • Review the current information security policies and procedures.
  • Update security requirements for IT assets and resources to ensure they are protected against current and evolving threats.
  • Document any changes and ensure compliance with DoD security policies.
  • Vulnerability Assessment and Remediation:
  • Conduct vulnerability assessments on systems and networks.
  • Identify and document any vulnerabilities found.
  • Develop and implement POAMs (Plan of Actionable and Milestones) for remediation of identified vulnerabilities.
  • Technical Support and Troubleshooting:
  • Provide technical expertise and support to resolve customer problems.
  • Utilize prior experience and understanding of how products and services interrelate to recommend effective solutions.
  • Afternoon Tasks:
  • Implementation of Information Assurance (IA) Products:
  • Support the implementation of IA-related products and services for both current and new initiatives.
  • Ensure that existing IA products are integrated with new hardware and software introduced to the network.
  • Document all activities, findings, and recommendations from the day’s work.
  • Prepare reports for management and stakeholders on the status of security initiatives, vulnerability assessments, and remediation efforts.
  • Continuous Learning and Development:
  • Stay updated with the latest trends, technologies, and best practices in information security and emerging technologies.
  • Participate in training programs or webinars to enhance your skills and knowledge.
  • Collaboration and Coordination:
  • Work closely with other IT professionals, stakeholders, and management to ensure alignment with organizational goals.
  • Participate in team meetings and discussions to share insights and seek input on complex issues.
  • Ensure that all IT assets and resources are compliant with relevant security standards and regulations.
  • Prepare for and assist with security audits and assessments.
  • By following this daily task list, the IT Specialist III Mid can effectively manage their responsibilities, ensure the security and integrity of IT assets, and provide valuable support to the organization
Loading...