System Administrator - OIG

Washington D.C
Aug 18, 2022
Aug 21, 2022
Full Time
General Hybrid Work Statement:

This opportunity is a hybrid opportunity allowing for flexibility between virtual and in-person work subject to the Authority's telework policy.


  • Associate degree in Information Technology, Computer Science, Cybersecurity or related technical field
    • In lieu of an Associate degree, a high school diploma or General Equivalency degree (GED) with two (2) years of experience as a System Administrator, Cybersecurity engineer\analyst, Information System Security Officer (ISSO) or Information System Security Engineer (ISSE) or related technical experience. This is needed in addition to the below experience

  • Five (5) years of experience as a System Administrator, Cybersecurity engineer\analyst, Information System Security Officer (ISSO) or Information System Security Engineer (ISSE) or related technical experience.

  • N/A

  • Bachelor's degree in Computer Science, Cybersecurity, or another technical field
  • Microsoft server administration certification(s) such as MTA, MCP, MCSA, and/or MCSD. CompTIA certification (s) such A+, Security +, and/or Network

Medical Group

Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations.

Mission Essential Designation:
  • In accordance with the Washington Metropolitan Area Transit Authority's Continuity of Operations Plan (COOP) this job has been identified as critical to mission essential functions. Incumbents in this role may be required to report to or continue to work in the event of authorized office closings or service suspensions due to severe weather, natural disaster, fire, operational emergencies or related events.


The System Administrator (SA) supports a wide array of technical and security duties, including system administration of servers, workstations, laptops, and other devices, as needed. Identifies the vulnerabilities and performs analysis of threats, applying system and network controls, and engineering technical solutions based on a thorough understanding of persistent threat tactics and techniques and the organization's infrastructure. The incumbent identifies threats and works to create steps to defend against them, supports senior professionals in vulnerability and penetration tests across all network segments, monitors network traffic for suspicious behavior and configures security systems such as firewalls, antivirus, and intrusion detection system/intrusion prevention system (IDS/IPS) software. The SA installs patches to maintain security of systems supported. S upports the creation of system documentation and review materials submitted for accuracy and compliance with policy or audit requirements. The incumbent supports general system administration and cybersecurity governance activities, such as drafting policy, formulating budgets and collecting data to support the OIG infrastructure and reports on the health of the organization.

Essential Functions
    • Evaluates and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.
    • Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs.
    • Serves as security administrator for one or more systems or applications, responsible for access control, passwords, and account creation and administration. Supports assigned systems in disaster recovery planning/exercises, incident response activities and development or upgrade activities, representing security interests.
    • Addresses problems; installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Typically provides initial incident information to the Incident Response (IR) specialty. Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components.
    • Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.
    • Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.
    • Supports the analysis of collected information to identify vulnerabilities and potential for exploitation.
    • Develops and administers security databases and/or data management systems that allow for the storage, query, protection, and utilization of data.
    • Responsible for setting up and maintaining a system or specific components of a system (e.g., installing, configuring, and updating hardware and software; establishing and managing user accounts: overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
    • Supports cybersecurity governance activities such as auditing systems, collecting and compiling data to develop metrics and scorecards, drafting or reviewing policy and collecting or compiling financial data and requirements for budgets and procurements.
    • N/A

    The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision.

    Evaluation Criteria

    Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience.

    Evaluation criteria may include one or more of the following:
    • Skills and/or behavioral assessment
    • Personal interview
    • Verification of education and experience (including certifications and licenses)
    • Criminal Background Check (a criminal conviction is not an automatic bar to employment)
    • Medical examination including a drug and alcohol screening (for safety sensitive positions)
    • Review of a current motor vehicle report


    WMATA is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other status protected by applicable federal law.

    This posting is an announcement of a vacant position under recruitment. It is not intended to replace the official job description. Job descriptions are available upon confirmation of an interview.