CareerZen Logo
Company logo

Linux System Administrator – Insider Threat (TS/SCI)

RightDirection Technology Solutions, LLC

Full-time

Washington, DC

Job description

❗Applicants without an active TS/SCI clearance will not be considered. Please do not apply if you do not meet this requirement❗

Linux System Administrator – Insider Threat (ITD)

Clearance Required: ACTIVE TS/SCI (Non-Negotiable)
Work Location: Onsite – Secure Facility (SCIF)
Schedule: Standard Business Hours
Employment Type: Full-Time
Program: Treasury Foreign Intelligence Network (TFIN)

NON-NEGOTIABLE REQUIREMENTS (READ FIRST)

Applicants must meet ALL of the following requirements to be considered:

  • Active TS/SCI clearance (current and verifiable)
  • U.S. Citizenship
  • Ability to work onsite full-time in a SCIF (no remote or hybrid)
  • 7+ years of hands-on Linux/UNIX system administration experience
  • Demonstrated experience supporting security-focused or mission-critical systems (e.g., insider threat, monitoring, cyber, or intelligence environments)
  • Experience performing Linux system hardening, patching, and vulnerability remediation

❗ Applicants who do not meet all non-negotiable requirements will not be considered.

POSITION OVERVIEW

We are seeking a Senior Linux System Administrator to support a mission-critical Insider Threat Detection (ITD) environment for a federal intelligence customer. This role supports Tier III Linux systems, User Activity Monitoring (UAM) platforms, and security-centric infrastructure operating in a highly classified environment.

This position requires technical depth, operational discipline, and security awareness. It is not a junior or generalist Linux role.

KEY RESPONSIBILITIES

  • Administer, configure, and maintain Linux/UNIX servers supporting Insider Threat and UAM platforms
  • Provide Tier III operational support for mission systems, including advanced troubleshooting
  • Perform system hardening, patching, and configuration management in accordance with federal security standards
  • Monitor system performance, logs, and health; identify anomalies and potential security issues
  • Support backup, recovery, and disaster recovery operations
  • Deploy, maintain, and support UAM agents and backend infrastructure
  • Assist with incident response, audits, investigations, and compliance activities
  • Maintain system documentation, SOPs, and baseline configurations
  • Collaborate with cybersecurity, network, and insider threat teams

REQUIRED TECHNICAL SKILLS

  • Linux/UNIX administration (RHEL, Rocky, CentOS, or similar)
  • Bash / shell scripting
  • System and log monitoring
  • Backup and recovery tools and processes
  • Linux security hardening and patch management
  • Experience supporting security monitoring, cyber, or insider threat systems
  • Familiarity with STIGs, NIST 800-53, or IC/Federal security frameworks

⭐ RECOMMENDED / PREFERRED QUALIFICATIONS

(Not required; used to identify top candidates)

  • Experience with User Activity Monitoring (UAM) tools
  • Prior work in an Insider Threat Program (ITP)
  • Experience supporting IC, Treasury, DoD, or law enforcement environments
  • Familiarity with SIEM or endpoint monitoring platforms
  • Certifications (recommended, not required):
  • RHCSA / RHCE
  • Security+
  • CISSP
  • GIAC (GCED, GCUX)

WHY JOIN

  • Support a high-impact national security mission
  • Stable, long-term federal program
  • Work alongside senior technical and security professionals
  • Competitive compensation aligned to clearance and experience (not publicly listed)

Pay: $53.00 - $65.00 per hour

Expected hours: 40.0 per week

Benefits:

  • Dental insurance
  • Health insurance
  • Paid time off
  • Vision insurance

Work Location: In person