Primary Purpose Of Position
The Information Security Administrator (Administrator) is a mid-level position that provides the technical expertise required to implement and manage complex cybersecurity systems, lead cybersecurity operations, and protect the confidentiality, integrity, and availability of the university’s technology infrastructure. The Administrator manages a variety of platforms including security incident and event management ( SIEM ) applications, intrusion detection and prevention systems ( IDS / IPS ), endpoint and extended detection and response ( EDR / XDR ) systems, and network and vulnerability scanning tools. This position plays a critical role in incident management, provides technical leadership of response tasks, and performs complex technical tasks to ensure that incidents are managed properly. The Administrator coordinates with network, system, and security staff in other departments, and provides technical cybersecurity leadership under the guidance of senior security staff. This position coordinates with service providers and consultants to ensure that the university’s needs are addressed. The Administrator works closely with senior Information Technology Services ( ITS ) managers and architects and acts as a consultant in cybersecurity-related matters. The Administrator reports to the Chief Information Security Officer ( CISO ) and is a mid-level member of the Information Technology Services ( ITS ) technical staff and security team. The Administrator works with leaders and other staff to ensure a high level of service to faculty, staff, and students, and to ensure that all technology systems are secured and meet compliance requirements.
Minimum Requirements
Master’s degree in computer science, Information Technology, or a related field with one year of experience directly related to the duties of the position, or bachelor’s degree in computer science, Information Technology, or a related field with two years’ experience directly related to the duties of the position. Technical knowledge of and experience with network, server, storage, endpoint, and cybersecurity systems, and related management and monitoring applications. Knowledge of information system, network, and cybersecurity architecture, and integration of disparate technology systems. Significant knowledge of common network protocols such as IP, TCP , UDP , ICMP , ARP , SNMP , DHCP , DNS , NTP , HTTP , SSH and RDP . Significant knowledge of technology systems from Microsoft, Linux, VMware, NetApp, Palo Alto, Extreme, Cisco, and other leading vendors. Significant knowledge of and experience with firewalls, IDS / IPS , SIEM , EDR / XDR , network management systems and network scanning tools. Knowledge of information security standards such as ISO 27002 or NIST SP 800-171 and their incorporation into technology systems design. Knowledge of incident response and forensics procedures. Knowledge of change control procedures. Ability to act independently with little or no guidance, especially during incident response situations where IT managers or senior staff are unavailable. Demonstrated ability to use effective problem-solving, negotiation, and decision-making skills to influence management and staff, as well as internal and external partners. Demonstrated strong customer service orientation, experience in partnering with other units, and fostering a team spirit within the department. Strong interpersonal and communication skills and the ability to work effectively with a wide range of constituencies in a diverse community and with a commitment to outstanding client service. Demonstrated ability to work collaboratively with ITS staff and university stakeholders of all levels of technical ability.
Preferred Years Experience, Skills, Training, Education
Demonstrated project management experience and excellent analytical and skills. Ability to write scripts to automate processes.