Overview
Skills
Job Details
Who we are:
ShorePoint is a fast-growing, industry recognized, and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a work hard, play hard mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion, and a focus on giving back to our community.
The Perks:
As recognized members of the Cyber Elite, we work together in partnership to defend our nation s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individual technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 80% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement, etc.
Who we're looking for:
We are seeking a Security Systems Administrator responsible for deploying, implementing, and maintaining cyber defense systems within the federal sector. The ideal candidate will have experience with DLP systems, a solid understanding of data classification processes, and a strong UNIX background. The Security Systems Administrator role plays a key part in ensuring the security of critical infrastructure and collaborates closely with cybersecurity teams to uphold our security standards. As a fast-growing cybersecurity company, we offer a dynamic environment where you ll have the chance to shape both our development and culture.
What you'll be doing:
- Test, implement, deploy, maintain, and administer dedicated cyber defense hardware and software.
- Perform system administration on specialized cyber defense applications (e.g., EDR, SASE, CTEM, DLP), including installation, configuration, maintenance, backup, and restoration.
- Coordinate with Cyber Defense Analysts to manage and update rules and signatures (e.g., intrusion detection/protection systems, antivirus, content lists) for specialized cyber defense applications.
- Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
- Assess the impact of sustaining dedicated cyber defense infrastructure and support test bed administration, including testing applications, hardware, and configurations managed by service providers.
- Identify and resolve potential conflicts with the implementation of cyber defense tools, including tool and signature testing.
- Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems and maintain documentation.
- Create, assess, and update system/application security configuration baselines to validate system compliance with required security baselines.
- Conduct security reviews to identify gaps in architecture and perform risk analyses for major system or application changes.
What you need to know:
- Intermediate knowledge of network and host-based firewalls, intrusion detection/prevention systems, data loss prevention, vulnerability scanning, anti-malware and spam protection, secure data transmission, and network monitoring/protection solutions.
- Experience with various cybersecurity tools, including Configuration Assessment, Log Aggregation, Integrity Verification, Web Application Security Testing, Network Access Control, Secure Access Service Edge (SASE), network intrusion prevention, and endpoint security.
- Working knowledge of SIEM/VTM technologies, cloud security, application security, network security, and disaster recovery.
- Proven ability to deploy, configure, and manage security implementation across IT systems, including antivirus management, vulnerability scanning, and firewall policies.
- Strong written and verbal technical communication skills.
- Proven ability to develop effective working relationships that improve the quality of work products.
- Ability to maintain focus and develop proficiency in new skills rapidly.
- Excellent organizational skills with the ability to handle competing priorities.
- Ability to thrive in a fast-paced environment, manage multiple tasks simultaneously, coordinate resources, and ensure scheduled goals are met.
- Strong problem-solving skills, with the ability to seek out data and evaluate solutions effectively.
- Must be able to multi-task, work independently and as part of a team, share workloads, and deal with sudden shifts in project priorities.
Must have's:
- Bachelor s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field or additional 3-5 years of relevant experience. (Bachelor s degree in Cybersecurity, Computer Science, Information Technology, Engineering, or 4 years of relevant experience in lieu of degree)
- 4 to 6 years of relevant experience.
- Demonstrated ability to apply critical thinking to develop undefined tasks into actionable processes and work streams.
- Experience working with Data Loss Prevention (DLP) systems and a solid understanding of data classification processes.
- Strong UNIX background with experience in administering and securing UNIX-based systems.
- This position requires U.S. citizenship in compliance with federal contract requirements.
Beneficial to have the following:
- Relevant industry certification.
- Ability to provide guidance on Enterprise Logging configurations for endpoint security technologies, firewalls, routers, switches, and CTEM monitoring applications.
- Experience analyzing audit results and working with stakeholders to resolve vulnerabilities and document exceptions.
- Strong ability to develop partnerships across IT functions where they intersect with security.
- Knowledge of modern software development and deployment practices, including unit testing, CI/CD (continuous integration/continuous deployment).
Where it's done:
- Remote (Herndon, VA).