What are the responsibilities and job description for the Security Administrator position at Connection, Inc.?
Connection has a fantastic opportunity through our Technical Staffing division for a Security Administrator in Tucson, AZ. This is a contract-to-hire opportunity for a great group in a municipalities company. This is a 100% remote position for someone in the state of AZ.
Connection offers terrific benefit options for our W2 contractors that start on the first day of the month!
The Information Technology Department is seeking an experienced Security Administrator with proven success in the realm of Cyber and Information Systems Security to join our Cyber Security Team.
Description:
- Recommending security architecture enhancements.
- Identifying host and network-based vulnerabilities.
- Creating department and city-wide security policies and procedures.
- Conducting intrusion and security event investigations.
- Remediating security incidents.
- Educating users on best security practices.
- Reviewing and recommending compliance requirements.
- Conducting security audits on critical infrastructure to ensure technology risks are identified and managed according to organizational and industry risk policies and guidelines.
We Value:
- Bachelor’s degree from an accredited college or university with major course work in computer information systems, business administration, public administration, or a degree related to the core functions of this position.
- Five (5) to seven (7) years of professional-level experience in computer network and IT systems security associated with a large organization. One year of experience administering security-specific hardware is required.
- Strong understanding of physical and virtual IT infrastructure, including servers, network devices, desktops, applications, and mobile devices.
- Good understanding of various network and endpoint security technologies.
- Skilled with using Mac, Windows, and Linux operating systems.
- Skilled in administering security applications, appliances, and systems.
- Understand how to audit a Windows AD Domain and Microsoft O365 environments.
- Knowledgeable of the different classes of cyberattacks.
- Familiar with penetration principles, tactics, tools, techniques, and attack stages that threat actors use.
- Knowledgeable in different network topologies, protocols, and components to apply the principles of a defense-in-depth approach to security and recommend secure network architecture design.
- Understand how to interpret CVE data for system and application security vulnerabilities.
- Capable of performing network packet-level analysis and damage assessment.
- Knowledgeable in the use of social engineering techniques to train users how to identify and avoid them.
- Certification in one or more of the following: Certified Ethical Hacker (CEH), CISA, CISM, CISSP, GIAC, Security Essentials Certification (GSEC), Security .
Security Officer
Good Guard Security -
Tucson, AZ
Security Officer
AZ Security & Protection -
Tucson, AZ
Security Officer
Blackstone Security Services Inc. -
Patagonia, AZ