Security Administrator
March 11th, 2025
Ensures the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and improvement of security systems, policies, procedures, and tools. Conducts risk assessments to identify potential security breaches. Responsibilities may include system or policy analysis, as well as planning and managing projects related to information security. Provides support for various security elements and components within the network.
Essential Duties and Responsibilities:
- Coordinates, mediates, and reports on the technical aspects of IT security and risk management.
- Leads security projects as directed by the supervisor.
- Responsible for digital data management strategies, including data classification and data loss prevention.
- Supports technical operations and works as a team to resolve and escalate security issues through monitoring, supervision, evaluation, and maintenance of systems and procedures to safeguard the network and information systems.
- Investigates, recommends, and implements changes to improve network and system security as directed by the supervisor.
- Analyzes vulnerabilities and security threats within the network and different areas, verifying existing controls to maintain residual risk aligned with the company's risk appetite.
- Consults with IT department personnel to ensure security is a factor in the evaluation, selection, installation, and configuration of hardware, applications, and software.
- Defines, creates, recommends, and coordinates the implementation of IT general controls (ITGC), procedures, standards, and policies to support and reinforce system, network, and component security.
- Researches, evaluates, designs, tests, analyzes, and recommends cybersecurity trends and their impact on the existing environment.
- Provides periodic and detailed reports on security incidents, service levels, and the overall security status of the systems.
- Oversees network security, focusing on network security design, particularly troubleshooting and debugging security-related network issues.
- Ensures the availability of security services and that they do not impact business operations.
- Administers security appliances such as firewalls, IPS/IDS, web content filtering, and application filtering to protect information so that only authorized personnel can access and use it.
- Monitors the installation of security patches and the remediation of vulnerabilities in applications and operating systems.
- Manages enterprise-level antivirus and anti-spam systems.
- Responsible for configuring, authenticating, supporting security, and authorizing general systems and VPN services.
- Recommends technical information materials and training on security trends, threats, best practices, and control mechanisms aligned with company policies, laws, regulations, and industry standards.
- Responsible for addressing, resolving, and correcting security audit findings.
- Works with the company's architecture team to ensure compliance with established security standards and defines new standards as needed.
- Monitors backup and recovery strategies for assigned systems and ensures they are properly executed. Ensures these strategies align with business needs.
- Identifies opportunities and provides corrective actions within the administration area within a reasonable timeframe.
- Participates in special tasks and/or projects as requested.
Education and/or Experience:
- Bachelor’s degree in Information Systems or equivalent work experience; MBA or MS in Information Security preferred.
- Minimum of 6-8 years of experience in IT, with five years in an information security compliance role.
- Experience with security management frameworks such as the International Organization for Standardization (ISO), IT Infrastructure Library (ITIL), and Control Objectives for Information and Related Technologies (COBIT) frameworks.
- Familiarity with legal provisions and regulatory requirements, including the Gramm-Leach-Bliley Act and Rule 76.
Licenses and/or Certifications:
- Security+, CISA, CISM, SSCP, or GSEC certifications are an advantage. However, licenses or certifications related to the position may be required for optimal job performance.
Language:
- Bilingual (Spanish and English), with the ability to read, write, and speak fluently in both languages.