This job offer is no longer available
About
The Windows Desktop/Server Administrator will provide Tier III IT operations support across the Office of Information Management (OIM) and SC mission systems. This role is responsible for operating and maintaining Windows-based servers, desktops, and hybrid infrastructure, ensuring service availability, performance, security, and compliance with DOE directives and federal IT standards. The ideal candidate will have deep expertise in Active Directory, Windows Server, endpoint management, and virtualization technologies, while also supporting cloud integrations and evolving enterprise service delivery models. Responsibilities: Administer and maintain Windows Server and Desktop environments (2016/2019/2022), including domain controllers, file servers, print servers, and application servers. Manage Active Directory (AD), including user/group management, OU structure, GPOs, DNS, DHCP, and replication. Provide Tier III support for Windows desktop environments, including OS deployment, patching, and troubleshooting. Support endpoint devices (Windows, macOS, and Linux where required), ensuring compliance with security baselines. Implement and maintain Microsoft Endpoint Configuration Manager (SCCM/Intune) for software distribution, patch management, and endpoint compliance. Operate and monitor physical and virtual infrastructure, including Hyper-V and VMware platforms. Support backup and restore processes in line with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). Maintain documentation of server configurations, rack layouts, cabling, power requirements, and capacity planning. Provide hands-on support for network and server hardware in communication closets and data centers. Continuously monitor Windows servers, desktops, and virtualization platforms for availability, health, and performance. Detect and resolve bottlenecks, outages, and performance issues in line with SLAs. Use approved monitoring tools (e.g., SCOM, SolarWinds, Azure Monitor) and recommend enhancements to improve operational effectiveness. Track and report on capacity utilization, resource consumption, and licensing compliance. Maintain operational records such as maintenance logs, backup validation history, and asset inventories. Maintain and update the Configuration Management Database (CMDB) to track Windows servers, desktops, and dependencies. Submit all changes via the OIM-approved change management system in accordance with the Change Control Review (CCR) process. Evaluate proposed changes for technical and cybersecurity risk, ensuring compliance with secure configuration baselines. Perform and document system patching, OS updates, and application upgrades in accordance with OIM policy. Minimum Qualifications: Bachelor's Degree in Information Technology, Computer Science or a related field or equivalent relevant experience; Master's Degree preferred. 8-15 years of experience in information technology, systems administration or other IT related field. Other Job Specific Skills: Demonstrated technical proficiency equivalent to industry-recognized certifications, such as: Microsoft Certified: Windows Server Hybrid Administrator Associate, Microsoft Certified: Endpoint Administrator Associate, CompTIA Network+ or Cisco CCNA (networking fundamentals), Vendor-specific certifications in firewalls, endpoint platforms, or virtualization. Proficiency in PowerShell scripting, automation tools, and CLI-based administration. Strong knowledge of Active Directory, Windows Server, SCCM/Intune, and virtualization platforms. Ability to support Windows, macOS, and Linux endpoints as required. Familiarity with federal IT compliance standards (e.g., FISMA, NIST SP 800-53). Experience with hybrid identity management (Azure AD Connect, federation, conditional access). Familiarity with Windows security baselines, compliance frameworks, and patch management policies. Strong troubleshooting skills for Windows OS, server roles, and virtualization issues. Excellent documentation and communication skills for technical and operational reporting. Knowledge of federal government IT best practices and standards. Experience with continuous monitoring and incident response in a federal environment. Understanding and application of FISMA (Federal Information Security Management Act) requirements. Familiarity with NIST (National Institute of Standards and Technology) Special Publications, particularly SP 800-53 (Security and Privacy Controls for Information Systems and Organizations). Experience with the RMF process for federal information systems, including system categorization, control selection, implementation, assessment, and continuous monitoring. Strong skills in incident detection, response, and recovery, following federal guidelines and protocols. Knowledge of cloud security principles and best practices, particularly relating to the security of cloud services used by the federal government (e.g., FedRAMP).
Languages
- English
Notice for Users
This job was posted by one of our partners. You can view the original job source here.