Systems Administrator 3 at AERONIX INC
Melbourne, Florida, United States -
Full Time


Start Date

Immediate

Expiry Date

25 May, 26

Salary

105000.0

Posted On

24 Feb, 26

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Information Assurance Analysis, SOC Operation, Authorization Programs, Configuration Management, EDR, HIPS, Posturing, IdP Policies, DLP, DLM, DPM Policies, Vulnerability Assessment, Risk Assessment, NIST, STIG, RMF

Industry

Defense & Space

Description
Aeronix Technologies Group is a dynamic and rapidly growing defense-focused organization specializing in enabling capabilities for the toughest missions.  With multiple locations across the United States, an international presence, CMMC and ISO requirements, the Information Technology team is critical to our success.   The Senior Systems Administrator will support the entire enterprise of Aeronix Technologies Group and their subsidiaries. This role will report to the Information Technology Lead for Aeronix Technologies Group in a rapidly growing environment, with US Government, commercial and international content. This role requires hands-on experience in technology architectural design, system maintenance, and configuration within government and industry compliance scopes. As Aeronix Technology Group grows, the Senior Systems Administrator will play a key role in supporting implementation and enhancement of technology and cybersecurity processes, systems, and controls, providing structure where needed while maintaining the agility required for growth. The individual will collaborate closely with Information System Security personnel, Information Technology groups, and Information Systems groups. This role is ideal for an administrator who thrives in a high-growth, fast-paced environment, is comfortable rolling up their sleeves, and can partner with multiple functions. Key Responsibilities: * Support information assurance analysis of program performance, providing early insight into risks, opportunities, and corrective actions. * Serves as chief SOC operator, interfacing with ISSM and ISSO teams as necessary. * Work with ISSM and ISSO to develop, audit, and maintain authorization, programs, configurations, and key boundaries. * Establish and maintain EDR, HIPS, and Posturing for endpoints and servers. * Establish and maintain IdP policies and controls. * Establish and maintain DLP, DLM, and DPM schedules, zones, and policies. * Develop and support Notice of Vulnerability, POA&M, and IAVM plans for the corporation. * Vulnerability and risk assessment for information systems, infrastructure, and clients. * Identify, recommend, and implement technology process improvement initiatives. * Apply solid working knowledge of NIST, STIG, RMF, and other government cybersecurity practices with flexibility and understanding for corporate execution. Qualifications: * BS in Computer Science or related Field.  8+ years in systems administration. * Experience in digital transformation efforts, projects, and implementation of new technologies in existing architectures. * Experience in government cybersecurity compliances (RMF/DIACAP experience preferred). * Experience with Microsoft Entra ID, Azure AD, or Active Directory (combination of at least two preferred). * Experience with Microsoft Purview, System Center DPM, or System Center Endpoint Configuration Manager (combination of at least two preferred). * Experience configuring, maintaining, upgrading, and supporting physical and virtual servers in a variety of hosting operating systems (Linux, Windows, etc.). * Experience in maintaining PKI/PKE infrastructure, certificate issuance, and best practices therein. * Strong analytical, problem-solving, and decision-making skills. * Excellent communication and interpersonal skills. * Secret National Security Clearance preferred.
Responsibilities
The Systems Administrator will support information assurance analysis, serve as the chief SOC operator interfacing with ISSM/ISSO teams, and develop, audit, and maintain authorization programs and configurations. Key tasks include establishing and maintaining security controls like EDR, HIPS, IdP, DLP, and developing vulnerability management plans.
Loading...