Linux System Administrator – Insider Threat (TS/SCI)
RightDirection Technology Solutions, LLC
Full-time
Washington, DC
Job description
❗Applicants without an active TS/SCI clearance will not be considered. Please do not apply if you do not meet this requirement❗
Linux System Administrator – Insider Threat (ITD)
Clearance Required: ACTIVE TS/SCI (Non-Negotiable)
Work Location: Onsite – Secure Facility (SCIF)
Schedule: Standard Business Hours
Employment Type: Full-Time
Program: Treasury Foreign Intelligence Network (TFIN)
NON-NEGOTIABLE REQUIREMENTS (READ FIRST)
Applicants must meet ALL of the following requirements to be considered:
- Active TS/SCI clearance (current and verifiable)
- U.S. Citizenship
- Ability to work onsite full-time in a SCIF (no remote or hybrid)
- 7+ years of hands-on Linux/UNIX system administration experience
- Demonstrated experience supporting security-focused or mission-critical systems (e.g., insider threat, monitoring, cyber, or intelligence environments)
- Experience performing Linux system hardening, patching, and vulnerability remediation
❗ Applicants who do not meet all non-negotiable requirements will not be considered.
POSITION OVERVIEW
We are seeking a Senior Linux System Administrator to support a mission-critical Insider Threat Detection (ITD) environment for a federal intelligence customer. This role supports Tier III Linux systems, User Activity Monitoring (UAM) platforms, and security-centric infrastructure operating in a highly classified environment.
This position requires technical depth, operational discipline, and security awareness. It is not a junior or generalist Linux role.
KEY RESPONSIBILITIES
- Administer, configure, and maintain Linux/UNIX servers supporting Insider Threat and UAM platforms
- Provide Tier III operational support for mission systems, including advanced troubleshooting
- Perform system hardening, patching, and configuration management in accordance with federal security standards
- Monitor system performance, logs, and health; identify anomalies and potential security issues
- Support backup, recovery, and disaster recovery operations
- Deploy, maintain, and support UAM agents and backend infrastructure
- Assist with incident response, audits, investigations, and compliance activities
- Maintain system documentation, SOPs, and baseline configurations
- Collaborate with cybersecurity, network, and insider threat teams
REQUIRED TECHNICAL SKILLS
- Linux/UNIX administration (RHEL, Rocky, CentOS, or similar)
- Bash / shell scripting
- System and log monitoring
- Backup and recovery tools and processes
- Linux security hardening and patch management
- Experience supporting security monitoring, cyber, or insider threat systems
- Familiarity with STIGs, NIST 800-53, or IC/Federal security frameworks
⭐ RECOMMENDED / PREFERRED QUALIFICATIONS
(Not required; used to identify top candidates)
- Experience with User Activity Monitoring (UAM) tools
- Prior work in an Insider Threat Program (ITP)
- Experience supporting IC, Treasury, DoD, or law enforcement environments
- Familiarity with SIEM or endpoint monitoring platforms
- Certifications (recommended, not required):
- RHCSA / RHCE
- Security+
- CISSP
- GIAC (GCED, GCUX)
WHY JOIN
- Support a high-impact national security mission
- Stable, long-term federal program
- Work alongside senior technical and security professionals
- Competitive compensation aligned to clearance and experience (not publicly listed)
Pay: $53.00 - $65.00 per hour
Expected hours: 40.0 per week
Benefits:
- Dental insurance
- Health insurance
- Paid time off
- Vision insurance
Work Location: In person