Under general direction, performs user and access administration on assigned systems and applications. In accordance with defined policies, standards, industry best practices and vendor guidelines, assists in the system security administration on designated technology platforms that may include operating systems, applications and network security devices. Assists manager/senior staff in the implementation of computer security and maintains integrity of specified computer workstations, servers, and local area networks through the maintenance of user accounts. Perform normal or exception processing of user access and change requests, escalating as appropriate. Remove or mitigate known control weaknesses (e.g. redundant user accounts) as a means of hardening the system.
Gathers information related to security incidents, user requests, and security escalations, etc. to include in management reports. Documents and escalates security incidents within specified/assigned systems to ensure timely follow-up and tracking. Reports unresolved security exposures, misuses of resources or noncompliance situations using defined escalation process. Monitor internal security control systems to ensure that appropriate information access levels and security clearances are maintained. Develops and maintains documentation for security systems and procedures. Provide security assistance for simple to moderately complex projects.
Associate and/or Bachelor's degree in Computer Science or Information Systems preferred
Technology certification (either CISSP, SSCP, GIAC, GISP, preferred)
Strong written communication skills, including procedures and technical material preparation and presentation.
Technical experience in/with:
Microsoft Active Directory, Operating Systems & Exchange, IBM Mainframe Security, Linux Operating System
Security Administration tools
PC fundamental tools (MS Office)
IBM mainframe and/or distributed computing fundamentals
security and control procedures
system development life cycle
troubleshooting and resolving problems
operational management methodologies (e.g. ITIL v3)
regulatory and compliance requirements (e.g. PCI, FFIEC, GLBA)
organization’s security policies, standards and controls
learn new security concepts and technologies
write security procedures and technical materials
perform a variety of concurrent activities
effectively communicate in a business setting
analyze business problems
develop recommendations for senior level review
Important Safety Tips: You should find out as much as you can about the company. Meet your prospective employers/employees face to face. You should NOT have to provide your bank account details. Stay safe - read our safety tips.
Click to copy
Just contact Customer Support.
Why list IT Security on eBay Classifieds? It's Free, Friendly & Local