About The Position

This role involves leading cyber systems administration, focusing on the design, deployment, and management of firewall infrastructure. The associate will be responsible for developing and enforcing firewall policies, conducting security audits, and troubleshooting network security issues. The position requires staying current with cybersecurity trends and technologies, and maintaining documentation for firewall configurations and procedures. The role also includes administering enterprise network perimeter defense systems, managing access control lists (ACLs) and security policies, and overseeing the IT infrastructure, including physical networks, servers, and applications. Key responsibilities also involve evaluating, testing, and maintaining information systems and cyber security policies, identifying security risks, and developing procedures for risk assessments and incident resolution. Employees in this role are expected to have a strong understanding of cybersecurity principles, operations security, cyber threats, and relevant national regulations.

Requirements

  • Minimum of 5 years with BS/BA; Minimum of 3 years with MS/MA; Minimum of 9 years with High School Diploma.
  • Understanding of firewalls, routing, switching and other telecommunications systems
  • Demonstrated experience managing tasks and interfacing regularly with senior government officials.
  • Experience in information operations planning, mission analysis, course of action development and concept of operation production.
  • Experience with effective policy, instruction, and development for Federal or DoD Information Security Programs
  • Experience with risk analysis and assessment determinations incorporating system/mission owner, and unique operational constraints
  • Possess a working knowledge of administrating servers, system and application security threats and vulnerabilities
  • Experience extending existing applications in areas such as security, monitoring, task automation, continuous integration, deployment, and performance optimization
  • Ability to work in a fast-paced environment and manage multiple priorities.
  • Strong problem-solving skills and attention to detail.
  • Excellent communication and documentation skills.
  • Must be able to obtain and maintain a Department of Energy (DOE) security clearance.

Responsibilities

  • Design, deploy, and manage firewall infrastructure.
  • Develop and enforce firewall policies and rules.
  • Perform regular security audits and assessments.
  • Troubleshoot and resolve firewall and network security issues.
  • Stay up to date with the latest cybersecurity trends and firewall technologies.
  • Create and maintain documentation for firewall configurations and procedures.
  • Administer and maintain enterprise network perimeter defense systems including next-generation firewalls, intrusion detection/prevention systems (IDS/IPS).
  • Manage and tune firewall Access Control Lists (ACLs) and security policies.
  • Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle).
  • Configures, installs, maintains, and upgrades server applications and hardware.
  • Evaluates, tests, recommends, coordinates, monitors, and maintains information systems (IS) and cyber security policies, procedures, and systems, including access management for hardware, firmware, and software.
  • Ensures that IS and cyber security plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS and cyber security.
  • Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents and improve security.
  • Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks, or leaks.
  • Employees have knowledge of cyber security principles, operations security, cyber threats and vulnerabilities, and knowledge of national regulations, policies, and ethics as they relate to cyber security.
  • Develop, review, and apply specific cyber operations guidance for integration into broader planning activities.
  • Collaborate with DOE leadership to leverage analytical and technical expertise to ensure mission goals are met.
  • Assist in developing new approaches to improve organizational framework through the coordination and integration of staff processes.

Benefits

  • Overtime
  • Shift differential
  • Discretionary bonus
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service