Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become An Information Security Administrator

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Security Administrator

  • Interacting With Computers
  • Getting Information
  • Identifying Objects, Actions, and Events
  • Making Decisions and Solving Problems
  • Communicating with Supervisors, Peers, or Subordinates
  • Mostly Sitting

  • Repetitive

  • $97,020

    Average Salary

What Does An Information Security Administrator Do At Hallmark Global Technologies Inc.

* Establish, administer and manage an information security program including cybersecurity policies and procedures, advising senior management regarding cyber risks, security awareness program, access control program, security audit program (AD Users, network testing, vulnerability scans, etc, disaster recovery planning, business continuity planning, physical security as it pertains to protecting information systems.
* Project manager for cybersecurity projects and is responsible for planning, scheduling, coordinating resources and completing project tasks.
* Thorough knowledge of all technology systems and organizational lines of service.
* Researches and understands regulatory standards for the organization.
* Participates in regional events and professional communities to maximize value of partnerships when developing an effective cybersecurity program.
* Responds to cybersecurity incidents when reported, completes investigation, and takes follow up actions as needed.
* Prepared to manage a full scale cyber security crisis.
* Other duties as assigned

What Does An Information Security Administrator Do At Apria

* Assist Security Architect and Analysts in all aspects of information security systems administration particularly in the maintenance of security policies and standards across IT systems. (40% of time)
* Performs day-to-day administrative work that relates to IT risk and compliance, internal investigations, audits, assessments, in conjunction with Legal, HR, Corporate Compliance, and Internal Audit. (25% of time)
* Ensures compliance with information security policies and monitor policy exceptions.
* Assist in the Security Awareness Program. (20% of time)
* Administer cyber threat news feeds including investigations and qualifying incidents reported. (15% of time)
* Performs other duties as required.
* None
* Minimum Required Qualifications

What Does An Information Security Administrator Do At NASA Federal Credit Union

* Other duties may be assigned.
* Design and implement safeguards to minimize risks, maintain compliance, and enable security.
* Stabilize, Standardize, and Simplify (S3) technology infrastructure and applications to optimize support resources.
* Protect the integrity and security of the Credit Union network, data, and infrastructure.
* Administer and maintain end user accounts, permissions, and access rights.
* Level I:
* Facilitates the day-to-day operations of the in-place security solutions.
* Identifies, investigates and resolves security incidents detected by those systems.
* Participates in the implementation of new security solutions
* Participates in the creation and or maintenance of policies, standards, baselines, guidelines and procedures, and reports.
* Demonstrates the ability to identify organizational risk and escalate appropriately.
* Keeps current with emerging security alerts and issues.
* Demonstrates familiarity with the NIST Cybersecurity Framework.
* Enforces established policies, procedures and associated plans for system security administration and user system access.
* Assists with the deployment, integration and initial configuration of all new security solutions and of any security solution
* Reviews logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
* Interpret the implications of that activity and devise plans for appropriate resolution.
* Assists with coordination of penetration testing to identify system vulnerabilities.
* Assists with audit or examination preparations and required responses.
* Applies scheduled fixes and security patches consistent with change management practices.
* Participates in investigations into anomalous security
* Level II (in addition to the requirements of a level I):
* Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate
* Implements and maintains policies, procedures and associated plans for system and network security administration and user system access.
* Oversee enforcement of these policies and procedures.
* Respond to unauthorized access incidents or member information usage that could result in substantial harm or serious inconvenience to a
* Maintains up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
* Performs the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
* Performs and/or oversee penetration testing of all systems in order to identify system vulnerabilities.
* Assist with documenting responses to external audits, intrusion attempts, risk assessments, cyber-crime and vulnerability assessments.
* Performs and documents risk assessments, as well as, investigates and remediates independent risk assessments.
* Maintains, tunes, and analyzes alerts from network security devices including IDS/IPS, NAC, SIEM, Firewalls, and other network devices.
* Manages security patches, fixes, and overall support of security tools consistent with change management practices.
* Manages security-related incident response activities and security breach remediation.
* Maintain operational security and cyber-security operations (e.g., incident response, security infrastructure management and monitoring services).
* Provides regular security reporting to management.
* Manages connection security for local area networks, the company website, the company intranet, and e-mail communications.
* Manages and ensure the security of databases and data transferred both internally and externally.
* Downloads and tests new security software and/or technologies.
* Provides on-call support for end users for all in-place security solutions.
* Provides security information and reporting to the Information Security Oversight Committee (ISOC).
* Identifies reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing PI and PHI.
* Level III (in addition to the requirements of a level II):
* Provides technical guidance to junior staff.
* Provides support and expertise to projects that require security expertise.
* Typically consults to project teams addressing projects of moderate size and complexity and where the security issues are clearly evident and can be addressed using various approaches.
* Acts as an expert providing direction and guidance to process improvements and establishing policies.
* Diagnoses security issues that may involve extensive analysis and recommends resolutions to management.
* Excellent verbal and written communication skills and the ability to interact professionally with a diverse group, executives, managers, and subject matter experts.
* Ability to balance project work with day-to-day administrative tasks and troubleshooting in a highly dynamic business environment.
* Researches opportunities to resolve persistent IT security issues and improve overall IT security architecture.
* Effectively contributes to the development of controls and processes improving information security services.
* Expected to provide security expertise across multiple technical platforms.
* Conducts research on emerging products, services, protocols, and standards in support of security enhancement and development efforts.
* Researches and recommends additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
* Exercises significant independent judgment within broadly defined policies and practices to determine best method for accomplishing work and achieving objectives.
* Deploys and/or manages all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.
* Develops procedures for the execution of security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company systems (e.g., email, data, ecommerce and other internal or customer facing systems).
* Lead information security resources for projects.
* Manages and/or provides guidance to junior members of the team.
* Manages the analysis and reporting of security activities to management

What Does An Information Security Administrator Do At KBR

* Responsible for the installation, configuration, maintenance, security, and support of desktop and laptop computers.
* Evaluates, tests, monitors, and maintains information security policies, procedures and systems such as hardware, firmware, and software.
* Ensures security design, controls, and procedures are aligned with information security standards and are appropriate to mitigate risk of exposure.
* Identifies security violations, determines cause, and implements procedures to prevent future incidents.
* Under direct supervision, assists in monitoring, responding, configuring, installing, and repairing hardware and software problems according to established procedures.
* Perform in depth network security analysis and work with the SOC analyst team conducting incident response, event analysis and threat intelligence for customer
* Provide both strategic analysis and near real-time auditing, analyzing, investigating, reporting, remediation, coordinating and tracking of security-related activities for customer
* Analyze data and prepare reports that document vulnerabilities from network based attacks and recommends actions to prevent, repair or mitigate these vulnerabilities
* Provide technical mentoring to other team members
* Establish and create standard operating procedures for a variety of computer network defense (CND) related tasks/positions within the team
* Provide technical expertise on post event network security logs and trend analysis
* Review security events that are detrimental to the overall security posture; analyze and detect sophisticated and nuanced attacks and discern false positives and provide results to client
* Perform correlation of events from a variety of network, enterprise and host collection sensors
* Coordinate and liaise with other Wyle departments with information regarding intrusion events, security incidents, and other threat indications and warnings information.
* Demonstrate both technical acumen and critical thinking abilities
* Perform computer and network forensics using various tools
* KBR offers a selection of competitive lifestyle benefits which could include a 401K plan with company match, medical, dental, vision, life insurance, AD&D, flexible spending account, disability, paid time off, or flexible work schedule.
* We support career advancement through professional training and development.
* KBR is an equal opportunity employer.
* All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law

What Does An Information Security Administrator Do At Ciber, Inc.

Develop, maintain and administer information security awareness programBuild and research new information security initiativesReview, develop and refine information security standards, polices, and procedures and implement controls to ensure complianceReview reports from security information and event management, intrusion detection and intrusion prevention systems and setup response accordinglyWork with auditors, conduct risk assessments and internal information security audits Manage compliance of information security to reduce risk Draft, keep up-to-date and apply policies applicable to the computing environment Helps sustain networks and servers running at an optimal state to reduce downtime through controlled risk management procedures Responsible for the maintenance of the Disaster Recovery plan (DRP)Projects and tasks as assigned

Show More

Show Less

How To Become An Information Security Administrator

Most employers require network and computer systems administrators to have a bachelor’s degree in a field related to computer or information science. Others may require only a postsecondary certificate.


Although some employers require only a postsecondary certificate, most require a bachelor’s degree in a field related to computer or information science. There are degree programs that focus on computer network and system administration. However, because administrators work with computer hardware and equipment, a degree in computer engineering or electrical engineering usually is acceptable as well. Programs in these fields usually include classes in computer programming, networking, or systems design.

Because network technology is continually changing, administrators need to keep up with the latest developments. Many continue to take courses throughout their careers and attend information technology (IT) conferences to keep up with the latest technology. Some businesses require that an administrator get a master’s degree.

Licenses, Certifications, and Registrations

Certification programs are generally offered directly from vendors or from vendor-neutral certification providers. Certification validates knowledge and best practices required from network and computer systems administrators. Companies may require their network and computer systems administrators to be certified in the product they use. Microsoft and Cisco offer some of the most common certifications.

Other Experience

To gain practical experience, many network administrators participate in internship programs while in school.


Network administrators can advance to become computer network architects. They can also advance to managerial jobs in information technology (IT) departments, such as computer and information systems managers.

Important Qualities

Analytical skills. Administrators need analytical skills to evaluate network and system performance and determine how changes in the environment will affect them.

Communication skills. Administrators must be able to describe problems and their solutions to non-IT workers.

Computer skills. Administrators oversee the connections of many different types of computer equipment and must ensure that they all work together properly.

Multitasking skills. Administrators may have to work on many problems and tasks at the same time.

Problem-solving skills. Administrators must be able to quickly resolve any problems that arise with computer networks.

Show More

Show Less

Information Security Administrator jobs

No Results

To get more results, try adjusting your search by changing your filters.

Add To My Jobs

Information Security Administrator Demographics


  • Male

  • Female

  • Unknown



  • White

  • Hispanic or Latino

  • Asian

  • Unknown

  • Black or African American

Show More

Languages Spoken

  • Spanish

  • Chinese

  • Japanese

  • French

  • Korean

  • German

  • Amharic

  • Hindi

  • Dakota

  • Italian

Show More

Information Security Administrator

Unfortunately we don’t have enough data for this section.

Information Security Administrator Education

Information Security Administrator

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time

Real Information Security Administrator Salaries

Job Title Company Location Start Date Salary
Information Security Administrator Populus Group, LLC Johnson City, TX Jul 06, 2014 $162,786
Information Security Administrator Populus Group Johnson City, TX Aug 29, 2013 $156,525
Information Security Administrator-Program Management Autodesk, Inc. San Francisco, CA Sep 14, 2016 $145,000
Information Security Administrator Populus Group San Antonio, TX Jul 06, 2013 $131,898
Senior Information Security Assurance Administrator Lendingclub Corporation San Francisco, CA May 09, 2016 $130,000
Senior Information Security Assurance Administrator Lendingclub Corporation San Francisco, CA Sep 05, 2016 $130,000
Manager-IT Security Administration Payless Shoesource, Inc. Topeka, KS Oct 01, 2014 $112,271
Information Security Administrator Populus Group Dallas, TX Jul 16, 2012 $108,524
IT Security Administrator The Children's Place Services Company, LLC Secaucus, NJ May 27, 2015 $100,000 -
IT Security Administrator II GTSI Corp. Herndon, VA May 11, 2011 $96,913
IT Security Administrator Thyssenkrupp Elevator Atlanta, GA Jan 12, 2016 $86,403
Information Administrator Wimplus Inc. West Covina, CA Jan 15, 2010 $83,647
Information Administrator Winplus Inc. West Covina, CA Mar 15, 2010 $83,647
IT Security Administrator Thyssenkrupp Elevator Atlanta, GA Dec 01, 2013 $82,000
Senior Associate, Information Security Administrator DFS Corporate Services LLC Riverwoods, IL Jan 16, 2016 $81,163
Information Administrator Samurai Infotech LLC Cumming, GA Sep 15, 2014 $80,000
Information Security Administrator Nrich Enterprise Solutions, LLC Roseville, CA Aug 29, 2016 $74,443
Information Technology Security Administrator 2 Ads Alliance Data Systems, Inc. Irving, TX Aug 13, 2015 $70,000
IT Security Administrator, Infrastructure Grantham, Mayo, Van Otterloo and Company, LLC Boston, MA Sep 02, 2015 $70,000
Information Security Administrator The Nasdaq OMX Group, Inc. New York, NY Aug 31, 2014 $66,500 -
IT Security Administrator Sprinklr, Inc. New York, NY Aug 15, 2016 $60,112

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for An Information Security Administrator


Show More

Top Information Security Administrator Skills

  1. Procedures
  2. Active Directory
  3. Ensure Compliance
You can check out examples of real life uses of top skills on resumes here:
  • Prepare and maintain documentation of technologies, standards and procedures.
  • Manage and support MS Server, Active Directory, Exchange/ Outlook email and SAP Security administration to global community.
  • Review and analyze end user accounts to ensure compliance.
  • Installed security information management system for security log event correlation, archiving and alerting.
  • Provide internal software issues in user's desktop on Windows XP and Windows 7 platforms.

Top Information Security Administrator Employers

Show More

Information Security Administrator Videos

Q&A - What To Expect in an I.T. Career. Things You Should Know Before.

Q&A - Salaries for Computer Jobs [How much $$$ can you make?]

Q&A -- Is there Job Security in I.T.?