IT Systems Security Administrator

The IT Systems Security position is responsible for the protection of the firm’s physical and non-physical Information Technology assets. This includes, but is not limited to, network equipment, servers, desktop and laptop computers, software, and electronic information. Main duties include designing, implementing, monitoring and maintaining security systems and hardware; security planning/integration; ensuring that all systems are safeguarded against all forms of malicious intrusions; assisting other groups within the firm in developing secure systems.



    1. Participate in the design of, implement, monitor and maintain security systems and hardware including Firewalls, Data Loss Prevention, Intrusion Preventions Systems and Network Access Control systems.
    2. Participate in the design of and support of DMZ security controls.
    3. Evaluate network architecture and hardware/software configurations for security vulnerabilities.
    4. Participate in the design of hardening procedures for network devices including servers and desktops.
    5. Participate in the review and analysis of internal applications and projects and external connectivity issues that may have an impact on security
    6. Ensure utilization of appropriate and effective authentication, encryption, and intrusion detection methods.
    7. Keep abreast of emerging security technologies and threats to make appropriate recommendations regarding implementations and mitigation strategies.
  • Monitoring of logs looking for trends and security threats.


  1. Three or more years of experience in technical information systems positions, with at least 2 years’ experience in a pure information security position <x{(}>(firewall administrator, IDS administrator, penetration tester, etc.).
  2. In-depth understanding of IP networking, networking protocols, network segmentation and security-related technologies. These include encryption, IPSEC, PKI, RADIUS, VPN’s, web application and traditional firewalls, proxy servers, Data Loss Prevention, change management monitoring, database activity monitoring, DNS, PGP, SSL, code signing, digital signature and digital rights management.
  3. CISSP or equivalent certification is preferred.
  4. Experience with information security policies, intrusion response procedures, disaster recovery procedures, risk analysis and significant experience administering the operations of a complex security infrastructure.
  5. Solid understanding of Microsoft Active Directory, especially Group Policy Objects.
  6. Experience with Red Hat administration.
  7. Understanding of Microsoft IIS.
  8. Excellent analytical, troubleshooting & interpersonal skills.
  9. Strong verbal and written communication skills.
  10. Ability to work in a team environment.


. . . . . . . .

Leave a Reply