SECURITY ADMINISTRATOR; REMOTE AZ

Job Expired

Overview

Connection has a fantastic opportunity through our Technical Staffing division for a Security Administrator in Tucson, AZ. This is a contract-to-hire opportunity for a great group in a municipalities company. This is a 100% remote position for someone in the state of AZ.

Connection offers terrific benefit options for our W2 contractors that start on the first day of the month!

The Information Technology Department is seeking an experienced Security Administrator with proven success in the realm of Cyber and Information Systems Security to join our Cyber Security Team. 

Responsibilities

  • Recommending security architecture enhancements
  • Identifying host and network-based vulnerabilities
  • Creating department and city-wide security policies and procedures
  • Conducting intrusion and security event investigations
  • Remediating security incidents
  • Educating users on best security practices
  • Reviewing and recommending compliance requirements
  • Conducting security audits on critical infrastructure to ensure technology risks are identified and managed according to organizational and industry risk policies and guidelines.

Requirements

  • Bachelor’s degree from an accredited college or university with major course work in computer information systems, business administration, public administration or a degree related to the core functions of this position
  • Five (5) to seven (7) years of professional-level experience in computer network and IT systems security associated with a large organization. One year of experience administering security-specific hardware required.
  • Strong understanding of physical and virtual IT infrastructure, including servers, network devices, desktops, applications, and mobile devices.
  • Good understanding of various network and endpoint security technologies.
  • Skilled with using Mac, Windows, and Linux operating systems.
  • Skilled in administering security applications, appliances, and systems.
  • Understand how to audit a Windows AD Domain and Microsoft O365 environments.
  • Knowledgeable of the different classes of cyberattacks.
  • Familiar with penetration principles, tactics, tools, techniques, and attack stages that threat actors use.
  • Knowledgeable in different network topologies, protocols, and components to apply the principles of a defense-in-depth approach to security and recommend secure network architecture design.
  • Understand how to interpret CVE data for system and application security vulnerabilities.
  • Capable of performing network packet-level analysis and damage assessment.
  • Knowledgeable in the use of social engineering techniques to train users how to identify and avoid them.
  • Certification in one or more of the following: Certified Ethical Hacker (CEH), CISA, CISM, CISSP, GIAC, Security Essentials Certification (GSEC), Security+

Legal Disclaimer: Connection is committed to equal opportunity and proud to be affirmative action employers. Connection and all of its subsidiary companies are committed to equal opportunity and proud to be affirmative action employers. All qualified applicants will receive consideration for employment, without regard to race, sex (including pregnancy), color, religion, age, national origin, ancestry, physical or mental disability status, medical condition, sexual orientation, marital status, protected veteran status, and all other characteristics protected by applicable state and federal law.

More Information

  • This job has expired!

Leave your thoughts

Share this job