Position: I.T. Security Administrator Levels I, II, and III
Department: Information Technology
Job Summary: The Security Administrator's role is to ensure the secure operation of the in-house computer systems, servers, and network connections. This includes checking server and firewall logs, scrutinizing network traffic, establishing, and updating virus scans, and troubleshooting. This person will also analyze and resolve security breaches and vulnerability issues in a timely and accurate fashion and conduct user activity audits where required. Provides extended information technology security support and coverage for the Enterprises information systems operations. All levels are responsible for exact duties and tasks, share equivalent access to complete all duties, tiers may have additional projects and deadlines determined by department Management.
Duties and Responsibilities: (Specific areas of responsibility included but not limited to.) - Maintains, supports, and troubleshoots hardware and software problems pertaining to the enterprise systems security needs.
- Initiates or suggests plans to motivate workers to achieve work goals.
- Acts as the contact person for IT Team on all system security needs and provides timely response.
- Coordinates installation of hardware and software security needs, and implementation of procedure changes.
- Establishes or adjusts work procedures to meet production schedules.
- Must be available on an ON-CALL basis during non-regular hours in, order to provide emergency systems service.
- Ensures training of subordinates takes place as directed.
- Deploy, manage, and maintain all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.
- Develop, write, implement, maintain, and oversee enforcement of policies, procedures and associated plans for system security administration and user system access based on industry-standard best practices.
- Design and implement disaster recovery plan for operating systems, databases, networks, servers, and software applications.
- Administer and maintain end user accounts, permissions, and access rights.
- Manage connection security for local area networks, company web site, company intranet, and e-mail communications.
- Works closely with Database Administrator to ensure the security of databases and data transferred both internally and externally.
- Design, perform, and/or oversee penetration testing of all systems in, order to identify system vulnerabilities.
- Design, implement, and report on security system and end user activity audits.
- Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity and interpret activity and make recommendations for resolution.
- Recommend, schedule (where appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach.
- Assess need for any security reconfigurations (minor or significant) and execute them if required.
- Keep current with emerging security alerts and issues.
- Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts.
- Interact and negotiate with vendors, outsourcers, and contractors to obtain protection services and products.
- Download and test new security software and/or technologies.
- Recommend, schedule, and perform security improvements, upgrades, and/or purchases.
- Perform system backups.
- Provide on-call security support to end-users.
- Manage and/or provide guidance to junior members of the team.
- Assists IT Team by providing backup/relief support for all positions as necessary.
- Performs other duties as assigned.
Knowledge, Skills, and Abilities: - Ability to demonstrate and perform the duties of the position.
- Broad hands-on knowledge of firewalls, intrusion detection systems, anti-virus software, data encryption, and other industry-standard techniques and practices.
- In-depth technical knowledge of network, PC, and platform operating systems.
- Working technical knowledge of current systems software, protocols, and standards.
- Standard and wireless networking security protocols experience with Cisco/HP equipment a must.
- Strong knowledge of TCP/IP and network administration/protocols.
- Intuition and keen instincts to pre-empt attacks.
- Hands-on experience with devices such as hubs, switches, and routers.
- Knowledge of applicable practices and laws relating to data privacy and protection.
- Knowledge of law enforcement practices and procedures
- High level of analytical and problem-solving abilities.
- Ability to conduct research into security issues and products as required.
- Strong understanding of the organization's goals and objectives.
- Strong interpersonal and oral communication skills.
- Highly self-motivated and directed.
- Strong organizational skills.
- Excellent attention to detail.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Experience working in a team-oriented, collaborative environment.
Minimum Qualifications: - Associate degree in a related area
- Minimum of two (2) years (2-3 years in Windows and Linux environment).
- A+ and/or, Network +, and or Security +, and or MCP certification.
- Hardware/Software Audit experience necessary.
- Must be familiar with standard concepts, practices, and procedures within IT field.
- Must be able to keep up with fast paced atmosphere and work under pressure.
- Must be in good physical condition.
- Must be able to interface in a positive manner with end users, all employees, and guests.
- Must be detail oriented, self-motivated, and willing to learn new systems.
- Ability to obtain a gaming license.
- Must have employment eligibility in the U.S.