Systems AdministratorLeidos
Description
Step into a role where your expertise directly strengthens the Air Force’s intelligence enterprise across the Indo‑Pacific. As a Systems Administrator supporting PACAF A2Y at Joint Base Pearl Harbor–Hickam, you’ll operate at the center of a globally distributed mission, ensuring the reliability, security, and performance of critical JWICS‑connected systems. You’ll join a team trusted to sustain and modernize enterprise‑level services—from Active Directory and Exchange to virtualization, backups, patching, and cross‑domain solutions—while shaping the technical standards that keep PACAF’s intelligence operations mission‑ready. This is an opportunity to apply deep technical skill, influence enterprise architecture, and support operators across the Pacific in a role where system uptime isn’t just a metric—it’s a strategic advantage.
What You’ll Do
Enterprise Systems Administration & Reliability
Maintain and optimize core enterprise services including Active Directory, Exchange, SCCM, SCOM, VMware, UNIX systems, storage platforms, and backup environments
Perform daily system monitoring and health checks to ensure availability, integrity, and compliance with AF JWICS SOPs
Meet or exceed 99% availability targets across AD, DRA, SQL, ITSM, Exchange, SCCM, CDS, and security auditing tools
Document all system health, events, and actions in SolarWinds, Splunk, SharePoint, and ITSM
Backup, Recovery & Virtualization Support
Administer enterprise‑level backup operations (AVAMAR), ensuring data integrity, restoral readiness, and compliance with JWICS directives
Support VMware‑based virtualized environments, including server hosting, configuration, troubleshooting, and modernization
Conduct periodic restoral testing and maintain enterprise restoration procedures
Patch Management & Cyber Readiness
Manage enterprise patch distribution via SCCM, WSUS, and Tanium across ESCs and regional sites
Submit, track, and implement approved security patch changes in alignment with CCMP processes
Ensure zero vulnerability incidents through proactive analysis, testing, and compliance tracking
Provide monthly vulnerability and patching reports to Government leads and the COR
Active Directory Standardization & Governance
Oversee enterprise‑level AD replication, schema changes, and OU hierarchy management
Administer and optimize NetIQ DRA for standardized directory operations
Maintain privileged account oversight, permissions auditing, and GPO governance
Develop and maintain enterprise AD SOPs, policies, and training materials
Technical Leadership & Collaboration
Develop, publish, and maintain enterprise SOPs across all supported services
Provide informal training to Government personnel on Windows, UNIX, and emerging technologies
Participate in bi‑weekly “Tech Talks” with ESCs and regional sites to synchronize enterprise operations
Troubleshoot, isolate, and resolve complex system issues across hardware, software, and network layers
Basic Qualifications
Bachelor’s degree with 8–12 years of experience, or Master’s with 6–10 years
8+ years of C4I systems administration experience
Active TS/SCI clearance (required on day one)
MCSA certification
DoD 8570.01 IAT Level II (Security+)
Strong understanding of DoD information security policies (COMPUSEC, INFOSEC, MLS)
Experience with Air Force intelligence systems (GALE, GCCS)
Proficiency with Microsoft Server environments, VMware, Exchange, Outlook, and SharePoint
Excellent communication, customer service, and analytical skills
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.
Original Posting:
January 16, 2026For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
