Oklahoma City, OK, USA
6 days ago
IT Security Administrator I

The Information Security Administrator functions include day-to-day operations of the in-place security solutions (Firewalls, system security, Remote Access, etc.) and the identification, investigation, and resolution of security incidents detected by those systems. Secondary tasks may include the development and/or implementation of security solutions, which fit into the security architecture. The Information Security Administrator requires awareness of the enterprise's security goals as established by stated policies, procedures and guidelines and actively work towards upholding those goals.

 

RESPONSIBILITIES

Participate in the implementation of enterprise security architecture. Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures). Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan. Maintain up-to-date and detailed knowledge of the IT security industry. Assist in the deployment, integration, and initial configuration of new security solutions and enhancements to existing security solutions. Assist in maintaining up-to-date baselines for the secure configuration and operation of all in-place devices, whether under Information Security control (i.e., security tools) or other asset owners (i.e., workstations, servers, network devices, etc.). Assist with operational configurations of all in-place security solutions as per the established procedures. Monitor all in-place security solutions for efficient and appropriate operations. Review logs and reports of all in-place devices, whether under Information Security control (i.e., security tools) or other asset owners (i.e., workstations, servers, network devices, etc.). Participate in investigations into problematic activity. Provide on-call support for end users for all in-place security solutions. Monitor security system events, and analyze potential threats and vulnerabilities on networks. Assist in the analysis of network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms. Update job knowledge by participating in educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations. Document and reports on specific duties, activities, problems solved, and issues resolved. Perform additional duties and assignments as requested. Work outside the standard office 8-hour workday may be required with on-call availability.
Confirm your E-mail: Send Email