Post job

How to hire an information security administrator

Information security administrator hiring summary. Here are some key points about hiring information security administrators in the United States:

  • There are currently 7,538 information security administrators in the US, as well as 157,160 job openings.
  • Information security administrators are in the highest demand in Chicago, IL, with 3 current job openings.
  • The median cost to hire an information security administrator is $1,633.
  • It takes between 36 and 42 days to fill the average role in the US.
  • Human Resources use 15% of their expenses on recruitment on average.
  • On average, it takes around 12 weeks for a new information security administrator to become settled and show total productivity levels at work.

How to hire an information security administrator, step by step

To hire an information security administrator, consider the skills and experience you are looking for in a candidate, allocate a budget for the position, and post and promote the job opening to reach potential candidates. Follow these steps to hire an information security administrator:

Here's a step-by-step information security administrator hiring guide:

  • Step 1: Identify your hiring needs
  • Step 2: Create an ideal candidate profile
  • Step 3: Make a budget
  • Step 4: Write an information security administrator job description
  • Step 5: Post your job
  • Step 6: Interview candidates
  • Step 7: Send a job offer and onboard your new information security administrator
  • Step 8: Go through the hiring process checklist

What does an information security administrator do?

An Information Security Administrator focuses on the proper installation of surveillance systems in a building or residence. This person is responsible for ensuring the appropriate installment of CCTV cameras and other equipment necessary to protect a perimeter adequately. Their responsibilities include ensuring the protection of all surveillance equipment from tampering, theft, and damage and providing support for the owner to resolve problems with the system and provide troubleshooting.

Learn more about the specifics of what an information security administrator does
jobs
Post an information security administrator job for free, promote it for a fee
  1. Identify your hiring needs

    Before you start hiring an information security administrator, identify what type of worker you actually need. Certain positions might call for a full-time employee, while others can be done by a part-time worker or contractor.

    Determine employee vs contractor status
    Is the person you're thinking of hiring a US citizen or green card holder?

    Hiring the perfect information security administrator also involves considering the ideal background you'd like them to have. Depending on what industry or field they have experience in, they'll bring different skills to the job. It's also important to consider what levels of seniority and education the job requires and what kind of salary such a candidate would likely demand.

    This list shows salaries for various types of information security administrators.

    Type of Information Security AdministratorDescriptionHourly rate
    Information Security AdministratorInformation security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.$27-55
    Securities AnalystSecurities analysts, also known as financial analysts, are responsible for collecting and interpreting data on securities, economies, corporate strategies, and financial markets. They provide clients with recommendations on investments based on in-depth research... Show more$28-56
    Security EngineerSecurity engineers are responsible for developing and overseeing data and security software to help prevent data breaches, leaks, and taps related to cybercrime. Other duties and responsibilities include developing new systems to help protect computer networks and assets, configuring firewalls, and conducting penetration testing to pinpoint vulnerabilities... Show more$37-67
  2. Create an ideal candidate profile

    Common skills:
    • Incident Response
    • Security Systems
    • Data Loss Prevention
    • Security Policies
    • Security Procedures
    • IDS
    • IP
    • HIPAA
    • Access Management
    • PCI
    • Security Incidents
    • Troubleshoot
    • ISO
    • SQL
    Check all skills
    Responsibilities:
    • Lead enterprise-wide virtualization effort, overseeing and completing vendor/hardware qualifications, architecture/design, installation, configuration, migration and documentation.
    • Work with auditors to gather the proper information for PCI and SOX audits and submit the information in timely require manner.
    • Create and conduct HIPAA training program for executive management and general staff.
    • Establish HIPAA policies and procedures and implement system measures to ensure compliance.
    • Interface with business managers, end-users and technical staff for provisioning of access.
    • Deploy new systems and network devices to include provisioning of access controls and monitoring.
    More information security administrator duties
  3. Make a budget

    Including a salary range in the information security administrator job description is a good way to get more applicants. An information security administrator salary can be affected by several factors, such as the location of the job, the level of experience, education, certifications, and the employer's prestige.

    For example, the average salary for an information security administrator in Louisiana may be lower than in California, and an entry-level engineer typically earns less than a senior-level information security administrator. Additionally, an information security administrator with lots of experience in the field may command a higher salary as a result.

    Average information security administrator salary

    $81,604yearly

    $39.23 hourly rate

    Entry-level information security administrator salary
    $57,000 yearly salary
    Updated January 22, 2026

    Average information security administrator salary by state

    RankStateAvg. salaryHourly rate
    1California$114,790$55
    2Washington$90,414$43
    3Texas$87,371$42
    4Nevada$85,390$41
    5New York$84,172$40
    6Maryland$83,517$40
    7Arizona$82,089$39
    8Illinois$81,427$39
    9Connecticut$74,391$36
    10Missouri$73,281$35
    11Indiana$73,102$35
    12South Dakota$70,391$34
    13Colorado$69,936$34
    14Ohio$67,544$32
    15Florida$63,292$30
    16Hawaii$62,063$30

    Average information security administrator salary by company

    RankCompanyAverage salaryHourly rateJob openings
    1Nasdaq$107,058$51.47
    2LendingClub$97,183$46.722
    3P&G$90,507$43.5111
    4Transcat$89,865$43.20
    5ICU Medical$89,202$42.89
    6Community West Bank$86,576$41.62
    7Randstad North America, Inc.$84,847$40.7913
    8Populus Group$84,634$40.69
    9Memorial Medical Group$83,285$40.04
    10Optum$82,968$39.891
    11Methodist Hospital Of Henderson, Kentucky$82,720$39.77
    12Carta$81,559$39.214
    13LinTech Global$76,789$36.926
    14Central Pacific Bank$76,515$36.792
    15Kelly Services$76,357$36.7118
    16Crane Co.$76,095$36.5815
    17Business First Bank$75,526$36.314
    18City of St. Louis$75,002$36.061
    19Northpoint$74,492$35.813
    20Byrne Dairy$72,660$34.93
  4. Writing an information security administrator job description

    An information security administrator job description should include a summary of the role, required skills, and a list of responsibilities. It's also good to include a salary range and the first name of the hiring manager. To help get you started, here's an example of an information security administrator job description:

    Information security administrator job description example

    Who We Are
    Point32Health is a leading health and wellbeing organization, delivering an ever-better personalized health care experience to everyone in our communities. At Point32Health, we are building on the quality, nonprofit heritage of our founding organizations, Tufts Health Plan and Harvard Pilgrim Health Care, where we leverage our experience and expertise to help people find their version of healthier living through a broad range of health plans and tools that make navigating health and wellbeing easier.

    We enjoy the important work we do every day in service to our members, partners, colleagues and communities.

    Job Summary
    Working within the framework of established operating procedures, this position is accountable for the administration of client accounts and system data security. This position is also responsible for the creation and maintenance of administrative documentation and the training of new Security Administration staff.

    Key Responsibilities/Duties - what you will be doing
    Perform administration functions for file servers, application servers and mid-range systems.Ensure that all functions and tasks are completed accurately and are in accordance with established procedures and Service Level Agreements.As required, administratively assist in ISCSC and Desktop Support functions; ensure the delivery of high-quality service to customers.As required, participate on project teams and manage the completion of all assigned project related tasks.

    Qualifications - what you need to perform the job
    EDUCATION, CERTIFICATION AND LICENSURE:
    Associate's degree or equivalent business experience is preferred.A Security+ certification is preferred.

    EXPERIENCE (minimum years required):
    Requires 1-2 years providing PC based hardware and software support and configuration.Experience with Unix and Windows 2012 or above operating system preferred.Experience with authentication and authorization is preferred Additional security, Microsoft Exchange, 365, Linux, Lotus Notes or HP/UX coursework or
    experience is helpful.

    SKILL REQUIREMENTS:
    Requires analytical and technical ability to understand the managed care business and the ability to interact effectively with others for systems analysis purposes.Requires an understanding of the role of information systems within the business. Requires a conceptual understanding of current and emerging computer and networking technologies pertinent to the business and information systems.Requires that the individual be well organized while being readily adaptable to changes in a fast-paced environment.Must be able to work independently and to exercise appropriate judgment as necessary.Requires strong verbal communication skills to effectively impart information to end-users.Requires the ability to multitask.Requires good interpersonal skills to work and communicate effectively with management, the end-user community, IS department and various software vendors.Requires the ability to maintain productive interpersonal relationships.

    WORKING CONDITIONS AND ADDITIONAL REQUIREMENTS (include special requirements, e.g., lifting, travel):
    Must be able to work under normal office conditions and work from home as required.Work may require simultaneous use of a telephone/headset and PC/keyboard and sitting for extended durations.May be required to work additional hours beyond standard work schedule.Work may require simultaneous use of a telephone/headset and PC/keyboard and sitting for extended durations.May be required to work additional hours beyond standard work schedule.

    Commitment to Diversity, Equity & Inclusion
    Point32Health is committed to making diversity, equity, and inclusion part of everything we do-from product design to the workforce driving that innovation. Our DEI strategy is deeply connected to our core values and will evolve as the changing nature of work shifts. Programming, events, and an inclusion infrastructure play a role in how we spread cultural awareness, train people leaders on engaging with their teams and provide parameters on how to recruit and retain talented and dynamic talent. We welcome all applicants and qualified individuals, who will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status.

    COVID Policy
    Please note: As of January 18, 2022, all employees - including remote employees - must be fully vaccinated. This position will require the successful candidate to show proof of full vaccination against COVID-19. Point32Health is an equal opportunity employer, and will consider reasonable accommodation to those individuals who are unable to be vaccinated consistent with federal, state, and local law.
  5. Post your job

    There are various strategies that you can use to find the right information security administrator for your business:

    • Consider promoting from within or recruiting from your existing workforce.
    • Ask for referrals from friends, family members, and current employees.
    • Attend job fairs at local colleges to find candidates who meet your education requirements.
    • Use social media platforms like LinkedIn, Facebook, and Twitter to reach potential job candidates.
    To find information security administrator candidates, you can consider the following options:
    • Post your job opening on Zippia or other job search websites.
    • Use niche websites that focus on engineering and technology jobs, such as dice, engineering.com, stack overflow, it job pro.
    • Post your job on free job posting websites.
  6. Interview candidates

    During your first interview to recruit information security administrators, engage with candidates to learn about their interest in the role and experience in the field. During the following interview, you'll be able to go into more detail about the company, the position, and the responsibilities.

    It's also good to ask about candidates' unique skills and talents. You can move on to the technical interview if a candidate is good enough for the next step.

    If your interviews with information security administrator applicants aren't enough to make a decision, you should also consider including a test project. These are often the best, most straightforward, and least bias-prone ways of determining who will likely succeed in the role. If you don't know how to design an appropriate test, you can ask someone else on the team to create it or take a look at these websites to get a few ideas:

    • TestDome
    • CodeSignal
    • Testlify
    • BarRaiser
    • Coderbyte

    The right interview questions can help you assess a candidate's hard skills, behavioral intelligence, and soft skills.

  7. Send a job offer and onboard your new information security administrator

    Once you've decided on a perfect information security administrator candidate, it's time to write an offer letter. In addition to salary, it should include benefits and perks available to the employee. Qualified candidates may be considered for other positions, so make sure your offer is competitive. Candidates may wish to negotiate. Once you've settled on the details, formalize your agreement with a contract.

    It's equally important to follow up with applicants who don't get the job with an email letting them know that the position has been filled.

    Once that's done, you can draft an onboarding schedule for the new information security administrator. Human Resources should complete Employee Action Forms and ensure that onboarding paperwork is completed, including I-9s, benefits enrollment, federal and state tax forms, etc. They should also ensure that new employee files are created for internal recordkeeping.

  8. Go through the hiring process checklist

    • Determine employee type (full-time, part-time, contractor, etc.)
    • Submit a job requisition form to the HR department
    • Define job responsibilities and requirements
    • Establish budget and timeline
    • Determine hiring decision makers for the role
    • Write job description
    • Post job on job boards, company website, etc.
    • Promote the job internally
    • Process applications through applicant tracking system
    • Review resumes and cover letters
    • Shortlist candidates for screening
    • Hold phone/virtual interview screening with first round of candidates
    • Conduct in-person interviews with top candidates from first round
    • Score candidates based on weighted criteria (e.g., experience, education, background, cultural fit, skill set, etc.)
    • Conduct background checks on top candidates
    • Check references of top candidates
    • Consult with HR and hiring decision makers on job offer specifics
    • Extend offer to top candidate(s)
    • Receive formal job offer acceptance and signed employment contract
    • Inform other candidates that the position has been filled
    • Set and communicate onboarding schedule to new hire(s)
    • Complete new hire paperwork (i9, benefits enrollment, tax forms, etc.)
    Sign up to download full list

How much does it cost to hire an information security administrator?

Hiring an information security administrator comes with both the one-time cost per hire and ongoing costs. The cost of recruiting information security administrators involves promoting the job and spending time conducting interviews. Ongoing costs include employee salary, training, benefits, insurance, and equipment. It is essential to consider the cost of information security administrator recruiting as well the ongoing costs of maintaining the new employee.

The median annual salary for information security administrators is $81,604 in the US. However, the cost of information security administrator hiring can vary a lot depending on location. Additionally, hiring an information security administrator for contract work or on a per-project basis typically costs between $27 and $55 an hour.

Find better information security administrators in less time
Post a job on Zippia and hire the best from over 7 million monthly job seekers.

Hiring information security administrators FAQs

Search for information security administrator jobs

Ready to start hiring?

Browse computer and mathematical jobs