HRTMS Job Description Management
| Systems Administrator 4 SYS ADM 4 (000520) UCPath Position ID: TBD_3977 | | |
Position Description History/Status | Approved Date: | 4/8/2025 8:03:12 PM | Date Last Edited: | 4/8/2025 8:03:06 PM | Last Action Effective Date: | | Organization Details | Business Unit (Location): | LACMP | Organization Code: | 1300O | Organization: | LETTERS AND SCIENCE | Division Code: | 1350D | Division: | L&S SOCIAL SCIENCES | Department: | 121500 - CALIFORNIA CNTR FOR POPULATION RESEARCH | Position Details | UCPath Position Number: | TBD_3977 | Position Description ID | 236975 | UC Payroll Title: | SYS ADM 4 (000520) | Business Title: | Systems Administrator 4 | Personnel Program | Management and Senior Professional (MSP) | Salary Grade: | Grade 25 | Job Code FLSA: | Exempt | Union Code (Collective Bargaining Unit): | 99: Non-Represented (PPSM) | Employee Relations Code: | E: All Others - Not Confidential | Employee Class (Appt Type): | 1 - Staff: Contract | Full-Time Equivalent (FTE) | 1 | SUPERVISION | UCPath Reports to Position Number: | 40060638 | Reports to Payroll Title: | ACADEMIC COORD III-FY | UCPath Department Head Position Number: | 40061227 | Department Head Payroll Title: | PROF-AY-B/E/E | | | |
Level of Supervision Received | GENERAL SUPERVISION - Indicates that the incumbent develops procedures for performance of variety of duties; or performs complex duties within established policy guidelines. |
POSITION SUMMARY | The California Policy Lab is seeking an IT Systems Director to help manage our growth into a social science data center hosting research conducted at all 10 UC campuses and supported by the UC Office of the President. CPL is now among the largest social science data centers in the country and seeks a recognized expert to lead our secure computing infrastructure (the "Data Hub"). CPL is a forward thinking technology and research environment. The Director will apply advanced systems infrastructure and concepts on behalf of the UC to resolve highly complex issues related to hosting over one hundred California government data sets, ensuring the security of these data, and supporting privacy-protected data linkages in computing environments that must be accessible to the more than 200 researchers who use CPL's Data Hub. The Director is responsible for developing solutions to novel technology problems, understanding and documenting system requirements, assessing technology in support of complex cost-benefit analyses, and managing the budget and procurement related to our system growth and maintenance. The Director will represent the University of California and CPL in presenting information to researchers and IT professionals at the UC Office of the President and UC campuses as well as state and county officials. This role will supervise CPL's IT Manager and together will monitor and optimize the performance of the Data Hub, support users of the Data Hub, and ensure compliance with all legal, regulatory, and security policies related to the Data Hub's information technology. The candidate must be capable of independently managing a large, multi-campus computing facility. | | | |
Department Summary | The California Policy Lab generates research insights for government impact. Through hands-on partnerships with government agencies, CPL performs rigorous research across issue silos and builds the data infrastructure necessary to improve programs and policies that millions of Californians rely on every day. We focus our work in six policy areas: education, criminal justice reform, poverty and the social safety net, labor and employment, health, and homelessness and high needs populations. CPL's UCLA site sits within CCPR and is a dynamic and growing organization with 20 full-time employees, a half dozen graduate student researchers, and numerous faculty affiliates. CPL is extramurally funded by over 20 different federal and foundation grants supporting over 60 major research projects. The Director will oversee IT systems at all CPL sites (currently Berkeley and UCLA, with a new Sacramento office opening soon) and will serve researchers using CPL’s data from over 60 different institutions. |
Key Responsibilities and Essential Functions | Function | Responsibilities | % Time | UC-Wide Social Science Computing Facility Management | CPL’s Data Hub presents issues unique among UC social science research data centers. The Director must analyze and solve problems without precedent or existing structure, such as how to design compartmentalized environments for hashed (encrypted) data linkages, with emphasis on data integrity and security. Apply advanced systems infrastructure concepts to define, design, and implement a VMWare ESXi virtualized server environment, based on latest high availability and clustering concepts, including design and implementation of Fibre Channel Storage Area Network. Secure remote Data Hub access through advanced VPN concepts, implementing latest security and authentication technologies. Design and implement CPL’s cloud-based “data enclaves” that allow remote computation of highly sensitive data, utilizing Amazon’s AWS services such as EC2, S3, or Lambda. Specify, write and execute complex and novel Powershell scripts to support systems management, including scripts that automate tasks within VMWare environment, as well as scripts that automate Active Directory administration and functions. Develop and manage a comprehensive set of Active Directory Group Policies to implement various data use requirements, as well as overall Data Hub Windows domain system requirements. Ongoing development, management and maintenance of an Active Directory infrastructure, Windows Servers and desktops, in a Windows/Active Directory based secure computing facility. Maintain documentation of the system. Develop and implement robust network security policies and procedures to prevent compromise of research and administrative data. Implement infrastructure to optimize access to the resources within CPL’s Data Hub and to minimize exposure to external and internal computer and network threats, including implementation of Next Generation Endpoint Security solutions, and Next Generation Firewalls. Stay current on emerging security threats and implement hotfixes as required. Maintain, update, and troubleshoot all components of the CPL’s Data Hub. Monitor network traffic using network analysis tools, maintain and keep current CPL’s VPN authentication servers, as well as VPN tunnels between CPL’s sites. Plan for future upgrades and replacement of all components of the CPL’s Data Hub. Independently assess emerging technology requirements and perform complex cost-benefit analyses to propose appropriate solutions. Install and fine tune tools to facilitate use of services including cross-platform integration. Configure, install, and maintain hardware and software. Supervise the set up and maintenance of Windows and Linux servers, and staff laptops. Supervise the resolution of user issues, software purchasing, maintenance of hardware, and vendor management. | 80% | Oversee IT & Data Policies, Including Security Standards | Interpret and adopt a highly complex set of over 50 different policies and regulations related to data security, data privacy, and data access required by UCOP, campuses, data providers, and state and local governments. Establish requirements for Data Hub access controls, data privacy, and data security; supervise and ensure their implementation. Develop and present technical information related to CPL’s Data Hub to IT experts in UCOP and in CA government agencies . | 20% | | | | | |
Other Requirements - Applies to all Positions | • | Performs other duties as assigned. | • | Complies with all policies and standards. | • | Complies with the University of California, Los Angeles (UCLA) Principles of Community. | • | This position description is not intended to be a complete list of all responsibilities, duties or skills required for the job and is subject to review and change at any time, with or without notice, in accordance with the needs of the organization. | | | |
Educational Requirements | Education Level | Education Details | Required/ Preferred | And/Or | Bachelor's Degree | Bachelor’s Degree in related and/or equivalent experience/training | Required | | | | | | | | |
Experience Requirements | Experience | Experience Details | Required/ Preferred | And/Or | | Demonstrated high degree of knowledge in the field of social science research computing and secure data enclaves | Required | | | Demonstrated advanced knowledge, skills, and abilities associated with problem identification related to secure data enclaves | Required | | | Demonstrated advanced expertise in communicating to government administrative data owners, researchers, and UC IT professional in a clear and concise manner | Required | | | Advanced experience writing and editing very complex scripts used to perform system maintenance and administration, such as those required for software designed to batch and manage large code runs. | Required | | | | | | | | |
Knowledge, Skills and Abilities | KSAs | Required/ Preferred | Ability to elicit and communicate technical and non-technical information in a clear and concise manner. | Required | Self-motivated and works independently and as part of a team. Demonstrates problem-solving skills. Able to learn effectively and meet deadlines. | Required | Demonstrated advanced knowledge, skills and abilities associated with system problem identification and resolution. Experience with design, configuration, operation, repair, and tuning of technology systems. Demonstrated advanced knowledge, skills and abilities associated with system problem identif | Required | Advanced experience writing and editing complex scripts used to perform system maintenance and administration. Advanced knowledge of computer security best practices and policies including demonstrated experience securing complex server-based software. | Required | Experience leading a team of IT professionals, including other full time employees or contractors. | Required | Extensive knowledge of desktop operating systems: Windows 7/8.1/10, Linux and Macintosh OSX and laptop computers | Required | Detailed knowledge of TCP/IP networking and Ethernet-based LAN protocols. In-depth knowledge of network security best practices, network switches, Cisco VPN, and AnyConnect software. Knowledge of common applications (Microsoft Office suite, browsers, file managers, etc.) | Required | Skilled in communicating effectively both orally and in writing; ability to create comprehensive technical documentation; develop and deliver presentations on technical topics to audiences of varying knowledge and level | Required | Demonstrated, advanced knowledge and skills in evaluating and comparing off the shelf and open source software solutions in order to make recommendations regarding purchasing or the necessity to produce in-house solutions. | Required | Ability to work efficiently and effectively in the midst of diversified responsibilities, changing priorities, and frequent interruptions. | Required | Advanced knowledge and skills related to relational database management systems and web servers such as MySQL, PostgreSQL, SQL Server, Wordpress, and Apache; Knowledge of Python | Required | Ability to install and configure routers, switches, hubs, and other network devices | Required | | | |
SPECIAL REQUIREMENTS AND/OR CONDITIONS OF EMPLOYMENT |
Reporting and Background Check Requirements | Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation. | Live Scan Background Check: A Live Scan background check must be completed prior to the start of employment. |
LOCATION AND PHYSICAL, ENVIRONMENTAL, MENTAL (PEM) REQUIREMENTS | Environment and Work Location Information | Environment Type: | Non-Clinical Setting | Location Setting: | Campus | Location: | Public Affairs Building | | | |
Physical Requirements | The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. | Physical Requirements | Never 0 Hours | Occasional Up to 3 Hours | Frequent 3 to 6 Hours | Continuous 6 to 8+ Hours | Is Essential | Standing/Walking | | | X | | X | Sitting | | | X | | X | Bending/Stooping | | X | | | X | Squatting/Kneeling | | X | | | X | Climbing | X | | | | | Lifting/Carrying/Push/Pull 0-25 lbs | | X | | | X | Lifting/Carrying/Push/Pull 26-50 lbs | X | | | | X | Lifting/Carrying/Push/Pull over 50 lbs | X | | | | | Physical requirements other | X | | | | | | | | | | | | | | | |
Environmental Requirements | The environmental requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. | Exposures | Never 0 Hours | Occasional Up to 3 Hours | Frequent 3 to 6 Hours | Continuous 6 to 8+ Hours | Is Essential | Chemicals, dust, gases, or fumes | X | | | | | Loud noise levels | X | | | | | Marked changes in humidity or temperature | X | | | | | Microwave/Radiation | X | | | | | Operating motor vehicles and/or equipment | X | | | | | Exposures other | X | | | | | | | | | | | | | | | |
Mental Requirements | The mental requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. | Exposures | Never 0 Hours | Occasional Up to 3 Hours | Frequent 3 to 6 Hours | Continuous 6 to 8+ Hours | Is Essential | Sustained attention and concentration | | | X | | X | Complex problem solving/reasoning | | | X | | X | Ability to organize & prioritize | | | X | | X | Communication skills | | | X | | X | Numerical skills | | X | | | X | Mental demands other | X | | | | | | | | | | | | | | | |
Blood/Fluid Exposure Risk | The exposure described here is what can be expected of an employee in performing the essential functions of this position. | X | Classification 3: Position in which exposure to blood, body fluids or tissues is not part of the position description. The normal routine task involves no exposure to blood, body fluids or tissues and the employee can decline to perform tasks which involve a perceived risk without retribution. | | | |
|