×
Register Here to Apply for Jobs or Post Jobs. X

Systems Administrator Principal

Job in Glendale, Maricopa County, Arizona, 85318, USA
Listing for: Agile Defense, Inc.
Full Time position
Listed on 2026-02-12
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Administrator, IT Support, Systems Engineer
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 1373

Job Title:

Telecommunications Specialist

Location:

Fort Huachuca

Clearance Level: Top Secret SCI

Required Certification(s): CISSP or RHCSA

SUMMARY

Manages the daily activities of configuration and operation of the organization’s IT systems and applications. Assists in the installation, maintenance, and general support of IT systems. Identifies and resolves problems associated with operating systems. Analyzes and resolves problems associated with server hardware/software and applications software. Detects, diagnoses, and reports related problems on both server, desktop, and mobile IT systems. Assists users with questions or issues related to accessing and using IT systems.

Installs new software releases and system upgrades, evaluates and installs patches, and resolves software related problems.

Performs system backup and recovery procedures. Maintains data files and monitors system configuration to ensure data integrity. Performs system capacity analysis and planning, and optimizes system operation and resource utilization. Develops and implements policies and procedures to ensure that systems support the organization's business requirements and meet the needs of end users. Defines system requirements based on user/client needs, cost, scalability, and required integration with existing applications, systems, or platforms.

JOB

DUTIES AND RESPONSIBILITIES

Perform the administration of the information systems and applications used to establish, distribute and protect, the unclassified, (NIPRNet, DREN, CFBLNet, Office of Secretary of Defense (OSD) Waivered Commercial Internet Service (CISP)), DoD Collateral Classified and Releasable (REL) Mission Partner network domains and communities of interest, (SIPRNet, SDREN, North American Treaty Organization (NATO), Five Eyes Alliance (FVEY)) data and VoIP services to the respective test lab, servers, and end-point workstations.

Contractor shall perform system administration for Windows and Linux operating systems; ESXi: VMware and MS Hypervisor virtualization;
Active Directory, Domain Name Service (DNS), web, Endpoint Security Solutions (ESS), Assured Compliance Assessment Solution (ACAS), database, email, collaborative tools, associated approved applications, test tools and services. The Contractor shall conduct System Administration (SA) for both physical and virtual servers, zero clients, thin clients, and physical end-point workstations.

Perform system administration of the information systems that establish the JITC Fort Huachuca, AZ instance of the Joint Worldwide Intelligence Communication System (JWICS). Contractor shall perform system administration of the systems and applications applied to this enclave and encompassed in Task 6.1 and with respect to the distinctive guidance established within the JWICS Security Classification Guide (SCG), respective Directives and Issuances from DISA, the Director National Intelligence (DNI) and the Defense intelligence Agency (DIA).

Perform routine audits of systems and software, system backup, archive and restore procedures, installation and configuration of new hardware and software, and the application of operating system updates, patches, and configuration changes, as directed by the U.S. DoD U.S. Cyber Command (US CYBERCOM) Information Assurance Vulnerability Management (IAVM) Program, Information Assurance Vulnerability Alerts (IAVA), Security Technical Implementation Guide (STIG) / Security Requirements Guide (SRG), Bulletins, and Technical Advisory (TA) issuances.

Contractor will initiate respective system STIG checklists periodically as prescribed within the Authority…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary