Position: AD Administration
Creation and management of directory infrastructure and upgrade of Directory infra
Includes FSMO roles, trusts, Kerberos KDCs, replication topology, etc.
Creation of all top-level OU hierarchies with LBL standard sub-OUs, groups, and appropriate security permissions. This includes adding the OU Admins to the Add Computers group, Group Policy Creator Owners group, and OU Admins mail list. It also includes setting appropriate permissions on the created objects and linking of default GPOs.
Monitoring and reporting associated with the reliability and security of the domain
Use the domain admin account only for actions that require the privilege level of this account
Monitoring changes to domain root and domain controllers OU to ensure unauthorized changes do not occur
Day-to-day management of the domain controllers
Monitoring connectivity, synchronization, replication, netlogon, time services, FSMO roles, schema, NTDS database partitions, DNS settings, SRV records, and trust relationships
Review DC event and security logs and take corrective actions
Monitor and resolve security situations at all levels of the domain to ensure a stable and secure domain
Domain Controller Management
Physical security of the domain controllers in IT Division space and oversite for all domain controllers
Backups and restores on domain controllers
Full disaster recovery plan and practice recovery of DCs and core Directory objects
Policy monitoring and compliance
Apply and enforce LBL standard naming conventions for objects in the domain
Comply with LBL AD policies and standards as defined on the AD Web Site
Monitor compliance with LBL AD policies and standards as defined on the AD Web Site, including Change Management,
Communication and Coordination
Arbitrate disputes between OU Admins
Provide OU Admins with assistance when requested
Coordination with the LBL Cyber Security group to ensure the LBL domain is secure
Comply with all Cyber Security group orders regarding emergency conditions
Work collectively with the OU administrators
Secure remote administration of the DCs and member servers managed by the Infrastructure Group
Manage group policy at root of domain and for Domain Controllers OU
Manage the root Users and the root Computers OUs
Install and manage security reporting tools used to monitor changes to the Active Directory
Coordinate and configure alarm distribution to OU Admins for OU-related events
Plan and manage all migrations and upgrades related to the AD or the D
Server Administrator
Host and maintain Virtual server (i.e., IIS, business specific service, etc.)
Upgrade Servers from 2012 to 2016 and 2019 and work with application owners.
Patching/software upgrades
Volume/partition space management
Software migration and applications upgrade
Software licenses for all member server(s) and applications
Good experience on virtual Windows 2012, 2016, 2019 Server Managements
Operating system maintenance for all non-Infrastructure-managed member servers
Maintain level of member server system security by applying Service Packs and security patches
Department application, file service, workstation and printer support
Backup/recovery plans for application servers
Full disaster recovery plan and practice recovery
Design, maintain, and troubleshoot Active Directory group policies, login scripts, DNS and DHCP
Maintain Active Directory and virtual servers
Build and configure Windows and VmWare servers
Responsible for production support activities for facilities operations to ensure the security and stability of the environment
Involves technical understanding of architecture and environments supported
Track points of friction for users, technology or operations, use analytics and then work with other teams to make those parts of banking better
Participating in system design improvements and performance enhancements
Participate in Business Continuity Planning and Exercises as needed
Assist the Database Administrator and Network Administrator in developing and implementing plans for new enterprise applications
Support existing systems
Education and Experience:
Bachelor's degree and three years of experience OR an equivalent combination of education and experience.
Skills Requirements:
Knowledge of current trends and developments in network-based communications systems.
Knowledge of internet/intranet/extranet technologies.
Knowledge of computer-based communications protocols.
Knowledge of client/server cabling methods and procedures.
Skill in installing, repairing and troubleshooting network programs, hardware and systems.
Ability to schedule and perform preventative and corrective maintenance procedures and repairs on network systems.
Ability to investigate, diagnose and repair network-based system problems.
Ability to communicate effectively, both orally and in writing.
Ability to establish and maintain effective working relationships with agency user personnel, MIS personnel and computer equipment vendors.
Bachelor of Science degree in Information Technology Management, Computer Science, Computer Engineering or a related discipline from an accredited college or university; and Seven years of related experience; including
Three years of supervisory responsibilities as disciplining, evaluating the performance of and recommending the hiring, firing, and promoting of subordinate employees.
Excellent verbal and written communication skills.
Previous IT experience in government is preferred.
Skills Requirements
Comprehensive knowledge of Data and Analytics best practices.
Knowledge of project planning and scheduling; business continuity of operations planning; audit and compliance programs; and pertinent laws, regulations, and best data governance practices.
Ability to analyze and resolve complex business problems.
Ability to supervise, plan, and schedule the work of a professional staff and coordinate large initiatives in an agency defined by cross-functional activities.
Ability to analyze and resolve complex business problems.
Excellent communication skills which include the ability to prepare and deliver a cohesive strategy to executive leadership.
Ability to communicate effectively orally and in writing with internal and external customers.
Considerable experience in technical leadership around data.
A mix of experience in various IT disciplines such as vendor management, enterprise architecture, data governance and other disciplines will also be considered.