Security Administrator Job Description Sample
- Application security monitoring (web scanning) to include performing source code analysis and web scanning using COTS tools.
- Vulnerability management using Security Center.
- Analyze architecture and system functionality for a broad range of technologies.
- Log analysis for incident remediation/threat hunting.
- Troubleshooting security and network problems.
- Provide support in the areas of information assurance, vulnerability assessment, enterprise protection planning, security monitoring, incident response, cyber security, and cyber threat analysis.
- Firewall management.
- B.S or higher degree in Computer Science.
- Working knowledge and demonstrated experience in network design, network security, and firewall technologies. Experience with Fortinet preferred.
- Experience with testing and identifying network and system vulnerabilities using tools from vendors such as Tenable, IBM, Checkmarx, and Netsparker.
- Experience with log analysis. Experience with Splunk preferred.
- Good understanding of computing security, authentication techniques, operation procedures and general practices in an enterprise IT infrastructure.
- Demonstrated self-initiated ability for analyzing, debugging, and tracking security issues.
- Identifies problems, determines the accuracy and relevance of information, and uses sound judgment to generate and evaluate alternatives, and to make recommendations.
- Excellent organization and time management skills and ability to identify priorities as needed to accomplish a variety of tasks.
- Excellent written and oral communication skills and ability to work with people at every level
Thank you for your interest in employment at Ariadne!
We look forward to reviewing your application.
Click Apply button now!
SECURITY ADMINISTRATOR (190003EJ)
As Ohio's Secretary of State, Frank LaRose is doing his part to deliver a thriving democracy and a prosperous economy for all Ohioans. In his role as the state's chief elections officer, he's working to ensure that Ohio's elections are both secure and accessible. And, as the first stop for new businesses in the Buckeye State, he is assisting entrepreneurs as they receive articles of incorporation for new a business. The Office of the Secretary of State's is seeking a Security Administrator to help deliver on that mission. From ensuring security at the Secretary of State's office to assisting the 88 counties across Ohio, this role serves an integral part in the overall mission in providing fair, safe, secure and accessible elections.
The duties of the Security Administrator position include but are not limited to:
Serves as Security Administrator for Secretary of State Office (SOS)
Develops policies, procedures and plans for overall security of office, election night security, and employee safety education and training; writes and updates business continuity plan for SOS
Develops working relationship with building management, federal, state, local law enforcement agencies, and county Boards of Elections
In conjunction with building management develops policies and procedures for recording of security cameras, monitors cameras and responds to incidents
Reviews and coordinates security procedures at the State of Ohio Computer Center for the SOS
Routinely collaborate on regular basis with county Boards of Elections (BOE) to educate and further enhance security at county level and assist county BOE with security assessments
Maintains accurate information and coordinates distribution and collection of building access identification badges, keys to offices and parking passes
Maintains spare key to SOS vehicles and obtain yearly Ohio BMV vehicle registration for Secretary's vehicle
Acts as Safety Officer for SOS (e.g., trains Emergency Floor Coordinators on safety and security policies and the responsibilities associated with emergencies [e.g., inclement weather; building evacuation; fire]
Coordinates annual CPR, AED and first aid certification as well as annual fire and tornado drills
Develops training materials to assure compliance of all safety procedures and policies
Provides safety and security orientation to new staff; develops, maintains and tests SOS business continuity plan for office, to be utilized in event of a disaster or emergency
Performs internal investigations as directed and completes incident reports
Assist with escorting visitors and customers
Performs other duties as assigned
Must have a minimum of three (3) years of related experience
Must have experience with personnel security and visitor control
High school education required
Two-year degree in Law Enforcement/ Criminal Justice preferred
Ability to effectively interact with supervisors, colleagues and customers face to face
Ability to meet consistent attendance
Ability to work independently with little supervision
Ability to maintain a Secret clearance
Proficient in Microsoft Office products
Job Summary: Responsible for auditing existing systems and administration of security policies, activities, and standards.
Responsibilities include but are not limited to:
Assist in the definition and communication of corporate plans, procedures, policies, and standards for the organization for acquiring, implementing, and operating new security systems, equipment, software, and other technologies.
Design and implement application, system, and database security for critical business applications
Manage ticket queue and provision access requests or security changes as requested
Implement and maintain best practices security design practices for managing access to applications, reports, servers, and databases
Define processes and procedures for provisioning and removal of access
Applies Ameris Bank security policies and procedures to ensure networks and applications are secure and available for customer use
Works with appropriate internal and external resources to resolve security issues within prescribed timeframes
Creates and maintains up to date documentation for reference purposes
Provides appropriate guidance and training to associates on Ameris Bank security processes, procedures, applications and networks.
Escalates and notifies management of policy/procedure discrepancies and violations
Work closely with IT department on corporate technology development to fully secure information, computer, network, and processing systems.
Recommend and implement changes in security policies and practices in accordance with changes in local or federal law.
Creatively and independently provide resolution to security problems in a cost-effective manner.
Collaborate with management, privacy officer, and human resources to establish and maintain a system for ensuring that security and privacy policies are met.
Remain informed on trends and issues in the security industry, including current and emerging technologies. Advise, counsel, and educate executive and management teams on their relative importance and financial impact.
To perform the job successfully, an individual should demonstrate the following competencies:
- Uses intuition and experience to complement data.
- Problem Solving
- Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully; Develops alternative solutions.
- Customer Service
- Responds promptly to customer needs.
- Oral Communication
- Listens and gets clarification; Responds well to questions.
- Able to deal with frequent change, delays, or unexpected events.
- Follows instructions, responds to management direction; Takes responsibility for own actions.
- Exhibits sound and accurate judgment.
- Approaches others in a tactful manner; Reacts well under pressure; Treats others with respect and consideration regardless of their status or position.
- Demonstrates accuracy and thoroughness; Looks for ways to improve and promote quality.
- Safety and Security
- Observes safety and security procedures.
Associates degree or two to three years related experience and/or training; or equivalent combination of education and experience.
Certificates and Licenses:
CompTia Security+ preferred
This job has no supervisory responsibilities.
This position reports to:
Support Operations Center Manager
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
Please view Equal Employment Opportunity Posters provided by OFCCP here.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
CTC-IS Security Administrator (SA)
While the ISSO has overall responsibility for CTC-IS, the CTC-IS SA provides technical contributions concerning the overall security to ensure the availability of critical resources and to facilitate overall system security and availability.
- The CTC-IS SA duties include real-time monitoring, system data collection, computer operations and analysis.
- Execute Incident Responses for all incidents involving the system, preparing incident reports and submit to appropriate IA personnel to include SOC ISSO, preparing incident reports and submit to appropriate personnel
- Apply patches and IA Vulnerability Alert (IAVA) for ATMP supported baselines.
- Rotational monitoring shall require 24 hours a day during rotations.
- Non-rotational monitoring shall require 8 hours a day during a standard workweek.
- Ensure all components have a representative security configuration baseline documented in Defense Information Systems Agency (DISA) checklist and Plan of Action and Milestones (POA&M) form.
- Execute continuous monitoring and compliance testing to validate the current configurations, against the documented security configuration baseline, and report compliance as required in the SSP.
- Execute comprehensive backup and recovery procedures to ensure availability IAW the SSP and contractual availability requirements.
- Perform necessary auditing and audit review as prescribed in the SSP.
- Perform account management and account review IAW the SSP.
- Support execution of annual FISMA and triennial reaccreditation efforts; ensuring
that validators are able to gain access to new and historical SOC data, per the SSP.
12)Maintain the CTC-IS audit functions and have the ability to review audit information for detection of possible system abuse and to coordinate with the ISSO
13) In coordination with the ISSO, ensure all components of the CTC-IS are protected so that the CTC-IS can operate effectively and securely
14) Reviews on a daily basis, the firewall/IPS log data to determine if attacks or inappropriate activity has occurred
- Previous ISSO/ Security Administrator experience
- Interim Secret Clearance
- Experience performing the continuous monitoring of system security controls
- Previous experience with HBSS
Previous Experience with SPLUNK
5) Must be able to build and maintain effective team and customer relationships
6) Possess strong written and verbal communications, interpersonal relations, organizational, troubleshooting and analytical skills
Maintains industry certification in accordance with DOD 8570.01-M & DODD 8140.01 for IAT Level II
7) Maintain at least one Cybersecurity-specific, industry certification for Computing
Environment (CSSP Analyst/Auditor/Incident Responder, MCSE Security, CCNA, Security, CEH, CISA, etc.) in accordance with DOD 8570.01-M & DODD 8140.01
The ADT Corporation (NYSE: ADT) is a leading provider of security and automation solutions in the United States and Canada for homes and businesses, people on-the-go and their network. Making security more accessible than ever before, and backed by 24/7 customer support, ADT delivers same-day service and live answer within seconds in customer operations, helping customers feel more safe and empowered. ADT is headquartered in Boca Raton, Florida and employs approximately 17,500 people throughout North America. More information is available at www.adt.com.
Installation, configuration and troubleshooting of security solutions such as AV/EDR, SIEM, DLP, O365 ATP, SOAR, IPS, Netflow, Vulnerability Management.
Provide updates, optimization and maintenance of security systems and appliances to ensure maximum availability.
Work directly with the SOC team to conduct incident response and event analysis using defined playbooks in a security orchestration and automation platform.
Interface with members across IT to deploy security solutions and configure secure system configurations.
Perform basic investigative searches and reporting using Splunk.
Proactively assess areas of potential risk or vulnerability and deliver recommendations to the Security and Risk Management Team.
Assist in applying solutions and controls to meet security compliance requirements.
Engage third-party vendors for support and best practices of security solutions.
Maintain security runbooks, policies, asset inventory, network diagrams, and contact lists.
EDUCATION AND EXPERIENCE
Bachelor's Degree in Cybersecurity, Computer Science, IT related or equivalent experience
CompTIA Security+, SANS, GIAC, Offensive Security, or CISSP certifications preferred.
Professional experience in Information Technology roles such as workstation/server administration, help desk, network support, application support.
Experience with security incident response and/or forensics.
Experience in Linux and Windows system administration, troubleshooting, and secure configuration.
Experience with network security devices such as firewalls, Intrusion Detection/Prevention, web application firewalls, Wireless Intrusion Prevention, Vulnerability Management and SIEM tools.
SKILLS AND KNOWLEDGE
Excellent communication and writing skills.
Open-minded, adaptable and passionate about learning.
Highly motivated and able to work independently and as part of a high performing team.
Strong analytical and problem solving skills.
Knowledge of security architecture, security policies and procedures, and best practices.
Knowledge of system, application, and network security attacks and mitigation techniques.
Knowledge of networking concepts, technologies, and protocols.
ADT LLC is an EEO Employer
Want to learn more about ADT?
Visit us online at www.adt.com
Rooted in the downtown landscape since 1929, American Enterprise knows what it means to stay viable in the marketplace. That is why the organization is in the midst of a transformation—reinventing the way we serve our customers. We are growing and are looking for dynamic individuals who are ready to share their talents and ideas with us.
Headquartered in Des Moines, Iowa American Enterprise employs approximately 450 employees between the Des Moines, Iowa and Omaha, Nebraska Ogden, and Utah offices. Through our family of companies, we create solutions that help secure the financial future of the customers we serve. Learn more at www.americanenterprise.com.
As a member of the American Enterprise Group Security Services Department, our Security Administrator will be responsible for implementing and maintaining security solutions including malware defenses, security training, vulnerability management, SIEM, and network segmentation firewalls.
Continue development and implementation of information security controls based on ISO 27002 & CIS 20 standards.
Maintain a vulnerability management system and perform system risk classification tagging.
Work with IT operations to prioritize and remediate system vulnerabilities.
Perform control testing and documentation to validate the configuration and effectiveness of security solutions and report deficiencies to management.
Monitor and investigate security alarms and escalate incidents as appropriate to senior information security staff.
Coordinate with security analysts and managed services partners to tune security alarm rules and reduce false positives.
Review application whitelisting requests and work with security analysts to develop approval rules.
Assist in the evaluation and implementation of firewall rules.
Maintain an online information security training program and help educate employees on good cyber security practices and proper data handling procedures.
Perform system monitoring, system auditing, and integrity check functions daily, monthly, quarterly, and annually as dictated in Information Security policies.
Assist in investigating security breaches and other cyber security incidents.
Bachelor's Degree in Business, IT or related field or equivalent experience
Experience administering Windows, Active Directory and Linux systems in an enterprise environment.
Experience in the administration of Anti-Virus and Malware prevention solutions.
Experience with vulnerability assessment tools such as Rapid7 preferable.
Experience in firewall administration is preferable.
Ability to take ownership of tasks from start to finish while keeping all stakeholders updated on progress.
Excellent interpersonal, written, verbal, and time management skills. Strong ability to document solutions, procedures, and processes.
IT Security certifications preferred.
Desire to continuously improve cyber security knowledge and accept new challenges.
2+ years of cybersecurity or equivalent work experience.
Job Description: Job Number: R0042890
Serve as a part of the Booz Allen Hamilton corporate security division, administer US government security policies and procedures related to the personal security (PERSEC) program in accordance with the National Industry Security Program Operating Manual (NISPOM), DCIDs/ICDs, and other government directives. Act as a team player, exhibit flexibility, set priorities, and manage customer expectations in a fast-paced environment. Work within a team environment, make sound decisions, take independent action, analyze problems, and provide focused firm-wide solutions firm-wide while communicating information to various audiences effectively and performing additional security duties, as assigned. Leverage expertise in administering US government security policies and procedures regarding the personnel security program. Maintain responsibility for conducting security clearance processing, pre-screens, and updates to various databases and review documentation for accuracy and completeness. Address PERSEC matters and other clearance actions for personnel requiring clearances for collateral and SCI positions. Interact daily with internal and external customers and government security officials to resolve issues.
2+ years of experience with personnel or industrial security
Knowledge of JCAVS, eQIP, and ACCS
Knowledge of NISPOM, DoD directives, EOs, or ICDs
HS diploma or GED
Experience as an FSO or CSSO
Knowledge of DoD SCI components and intelligence communities
Possession of excellent oral and written communication skills
Possession of excellent customer service, organization, and interpersonal skills
Top Secret clearance preferred
BA or BS degree
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required.
We're an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.
The Security Administrator reports to the Manager - eDiscovery and Forensics, and is a member of a larger Security Engineering and Operations (SecOps) organization that designs, deploys and operates security tools. The Engineer will also be architecting solutions and services, maintaining existing applications and infrastructure, migrating existing solutions to the cloud, and deploying security in depth across Gap Inc.
Daily use and administration of EnCase and Office 365 (including Exchange, OneDrive, SharePoint, Teams, Security and Compliance Center).
Daily maintenance and administration of all software and hardware used by the eDF team (EnCase eDiscovery, Office 365 Administration, Symantec Endpoint Protection, Symantec Data Loss Prevention, Carbon Black).
Familiarity with network activity analysis using various logging solutions and aggregators including PAN, and Splunk.
Advise and implement architecture, management, and access control for solutions supporting the eDiscovery and Forensics, and Legal teams.
Experience with cloud solutions such as Azure and AWS.
Experience with Microsoft Exchange and 0365.
Strong knowledge of Microsoft Windows administration (including Windows Server 2016, IIS, Active Directory, Group Policy management).
Strong knowledge of Microsoft Exchange and 0365 environments.
Proficient in at least one scripting language (e.g. Python, Ruby, etc.).
Strong knowledge of and experience with Powershell.
Familiar with cloud environments (Azure, AWS, Oracle, etc.).
3 years of experience building secure systems, networks and infrastructure.
Strong Microsoft Windows administration skills.
Proven understanding of cloud solutions including "lift and shift" and security solutions.
Knowledge of data management (architecture, movement, and mapping) a plus
MINIMUM QUALIFICATIONS: Bachelor's degree in Information Technology specializing in IT Security along with two years of practical experience.
Prior employment experience within the technology and security related fields may be substituted for educational requirements. Security certifications are highly desirable .Must be able to handle stress and establish priorities. Must be courteous, able to handle frequent deadlines and interact with people.
Duties and responsibilities require judgment, initiative and attention to detail. Candidate must possess the ability to function well in a rapidly changing environment with little direct supervision. Professional demeanor is essential.
ESSENTIAL FUNCTIONS: Assist the security architect leveraging available tools, contracted security partners and available resources to identify security threats to the organization and create steps to defend against them.
Incumbent must demonstrate knowledge of commonly used concepts, practices and procedures within field. Incumbent is held accountable for following appropriate policies and procedures regarding protecting the availability and security of organizational footprint. Incumbent must be able to work with limited supervision and exercise independent judgment.
Maintain documentation of problems reported and resolutions. Actively participate in organizational monitoring for suspicious activity. Technical knowledge necessary to manipulate/modify risk mitigating devices (firewalls, network access control, IPS/IDS, Privilege Identity Management, malware mitigation, web proxy, etc.). Provide technical support to the Help Desk in resolving end user access or application issues.
Ability to comply with Help Desk service standards and provide good customer service is required. Actively participate in the sales and service culture, support the values of the organization and follow established holding company policies and procedures.
"Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status."
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
Please view Equal Employment Opportunity Posters provided by OFCCP here.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information.
Apply On-line Send This Job to a Friend
RELATED LINKS: Personal ▶ Business ▶ Trust and Wealth Management ▶
- First Financial Bankshares, All Rights Reserved
FFIN Swipe a Truck
You are using an unsupported browser version. An updated browser is the gateway to a better and more secure online financial experience.
Update your browser now to protect your financial information and benefit from all of the features available from First Financial Bank's websites. Upgrade your browser by clicking one of the logos below.
You'll be automatically r
Medical Science & Computing (MSC) is an exciting growth oriented company, dedicated to providing mission critical scientific and technical services to the Federal Government. We have a distinguished history of supporting the National Institutes of Health (NIH) and other government agencies. MSC offers a dynamic and upbeat work environment, excellent benefits and career growth opportunities.
We attract the best people in the business with our competitive benefits package that includes medical, dental and vision coverage, 401k plan with employer contribution, paid holidays, vacation, Medical and Flexible Spending Accounts, Pre-Tax Transit Assistance and tuition reimbursement. If you enjoy being a part of a high performing, professional service and technology focused organization, please apply today!
Medical Science & Computing is searching for a Security Administrator to support the National Center for Biotechnology Information (NCBI), part of the U.S. National Library of Medicine, National Institutes of Health. This opportunity is full-time, and it is on-site in Bethesda, MD.
Duties & Responsibilities
Application security monitoring (web scanning) to include performing source code analysis and web scanning using COTS tools.
Vulnerability management using Security Center.
Analyze architecture and system functionality for a broad range of technologies.
Log analysis for incident remediation/threat hunting.
Troubleshooting security and network problems.
Provide support in the areas of information assurance, vulnerability assessment, enterprise protection planning, security monitoring, incident response, cyber security, and cyber threat analysis.
B.S or higher degree in Computer Science.
Working knowledge and demonstrated experience in network design, network security, and firewall technologies. Experience with Fortinet preferred.
Experience with testing and identifying network and system vulnerabilities using tools from vendors such as Tenable, IBM, Checkmarx, and Netsparker.
Experience with log analysis. Experience with Splunk preferred.
Good understanding of computing security, authentication techniques, operation procedures and general practices in an enterprise IT infrastructure.
Demonstrated self-initiated ability for analyzing, debugging, and tracking security issues.
Identifies problems, determines the accuracy and relevance of information, and uses sound judgment to generate and evaluate alternatives, and to make recommendations.
Excellent organization and time management skills and ability to identify priorities as needed to accomplish a variety of tasks.
Excellent written and oral communication skills and ability to work with people at every level.
Medical Science & Computing is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, or protected Veteran status.
Making better hires starts with building better job descriptions
- Browse 100s of templates across 40+ industries
- Customize your template with your company info & job requirements
- Post it to 20+ job boards in seconds – for FREE!