Systems Administrator

In addition to performing technical work, every member of our consulting staff has the opportunity to have in-depth client interactions that require excellent verbal and written reporting skills.
Our consultants are the ones who hold each and every client relationship at our Company.
These relationships drive our ability to quickly and accurately identify and solve our clients' most difficult problems.
This position must possess a depth of experience that allows you to grasp issues and concepts quickly.
The ideal candidate is able to work with a diverse high-performance team in a fast-paced setting with on-call duties as required and performs well under pressure and within aggressive schedules.
You must be able to work well with application developers, customers, operations staff and other business units.
You must also have knowledge and experience supporting WAN environments based on both public and private solutions, such as Frame Relay, point-to-point, T1, DS3, OC-x, MPLS and encrypted tunnels over public networks.
Additional requirements for the IT Network Administrator include:
1.
Minimum 2 years progressively responsible experience supporting LAN and WAN environments in a 24x7 commercial setting2.
In-depth knowledge of Cisco ASA and Catalyst 45xx switches in redundant configurations3.
Experience with IPsec VPN setup, configuration and troubleshooting4.
Working knowledge of UNIX host networking configurations5.
Experience with network monitoring and management toolsWe understand that our work for clients can, at times, be extremely intense.
However we also realize that your personal life is important.
Our work environment is one that allows our staff to strike the right balance between their professional and personal commitments.
Our consultants feel that our Company is both a technically stimulating and fun workplace!

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.