Network / Domain Administrator & Security Operations (SOC)

InversionLos Angeles, CA
$140,000 - $180,000Onsite

About The Position

The Network / Domain Administrator & Security Operations (SOC) role is responsible for secure administration of network infrastructure, identity systems, and continuous monitoring of security events across corporate and enclave environments. This role enforces access control, network security, logging, and incident detection/response in alignment with NIST SP 800-171, CMMC Level 2, and DFARS requirements. This position serves as a primary operator for security monitoring (SOC functions) and ensures visibility, detection, and response capabilities across all systems handling CUI.

Requirements

  • 5–9+ years of experience in network administration and/or security operations
  • Strong knowledge of: Networking (TCP/IP, VLANs, routing, firewalls) Identity and access management (AD, Entra ID) Experience with SIEM and monitoring tools
  • Understanding of security principles and incident response

Nice To Haves

  • Experience in regulated environments (CMMC, NIST 800-171, GovCloud, GCCH)
  • Certifications such as: Security+, CySA+, CISSP (or equivalent)

Responsibilities

  • Administer identity systems (Microsoft Entra ID, Active Directory, GCCH tenants)
  • Enforce MFA, conditional access, and least privilege principles
  • Manage privileged accounts and implement separation of duties
  • Conduct periodic access reviews and account audits
  • Configure and manage network infrastructure: Firewalls, routers, VLANs, ACLs
  • Enforce segmentation between: Corporate network CUI enclave (CTMD) External/public access
  • Manage DNS, DHCP, and IP address management
  • Monitor and control inbound/outbound network traffic
  • Ensure centralized logging across systems: SEIM and 3rd Party SOC
  • Maintain log retention in accordance with policy
  • Validate log integrity and availability for audit purposes
  • Generate audit reports and provide evidence for compliance reviews
  • Monitor security alerts, events, and anomalies across all environments
  • Perform triage, investigation, and escalation of security events
  • Correlate logs across endpoints, network, and applications
  • Maintain alert tuning and detection rules
  • Support continuous monitoring strategy required by CMMC
  • Lead or support incident detection, containment, eradication, and recovery
  • Document incidents and maintain incident response records
  • Coordinate with IT, application, and management teams during incidents
  • Ensure proper evidence handling and chain of custody
  • Maintain secure baseline configurations for: Network devices Identity systems
  • Review and approve network and security-related changes
  • Ensure all changes are documented and auditable
  • Perform vulnerability scanning and remediation coordination
  • Identify risks related to network and identity systems
  • Track and remediate findings (POA&M support)
  • Enforce encryption and secure protocols across network communications
  • Validate secure configurations for remote access and VPNs
  • Ensure secure integration with enclave systems and cloud environments
  • Manage: Network infrastructure (switches, routers, firewalls, VLANs) Identity platforms (Entra ID, AD, GCCH identity) Monitoring and SIEM platforms and working with 3rd party SOC
  • Maintain network diagrams and documentation (e.g., NetBox)
  • Support secure connectivity between corporate, enclave, and cloud environments
  • Assist with compliance audits and security assessments
  • Participate in on-call rotation for incident response

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

11-50 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service