FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Information Security Administrator Skills

Below we've compiled a list of the most important skills for a Information Security Administrator. We ranked the top skills based on the percentage of Information Security Administrator resumes they appeared on. For example, 7.9% of Information Security Administrator resumes contained Security Procedures as a skill. Let's find out what skills a Information Security Administrator actually needs in order to be successful in the workplace.

These Are The Most Important Skills For A Information Security Administrator

1. Security Procedures
demand arrow
high Demand
Here's how Security Procedures is used in Information Security Administrator jobs:
  • Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures.
  • Update Information Security procedures manual with changes in procedures and security environment.
  • Conducted training on databases, security procedures, and application security.
  • Led team in establishing remote access security procedures for Offshore teams.
  • Test security procedures and access rights.
  • Directed the implementation of Citrix security procedures on 5 different Windows 2000 domains.
  • Documented security procedures for Coke Cola Enterprises and vendor applications according to Sarbanes Oxley (SOX) regulations and corporate policies.

Show More

6 Security Procedures Jobs

No jobs at selected location

2. Information Security
demand arrow
high Demand
Here's how Information Security is used in Information Security Administrator jobs:
  • Collaborated with various departments within Risk Management to research, evaluate, and initiate action to improve internal information security processes
  • Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls.
  • Conducted feasibility studies and coordinated with business area managers on information security process improvements.
  • Conduct Annual Information Security Audit across network infrastructure at HO and development centers.
  • Developed and implemented Policy, Standards and Procedures for Information Security.
  • Managed and supervised a team of four Information Security Specialists.
  • Provide technical support for all information security managed systems.
  • Served as Information Security Administrator using CA-Top Secret.
  • Lead administrator for the Corporate Information Security Program.
  • Maintained the information security platform.
  • Developed monthly Information Security Newsletters.
  • Provide information security consultation services to internal technical clients as well as guidance and training to new and/or junior team members.
  • Assisted with the development of an internal website for the Information Security Department.
  • Key resource for any projects that needed access Information Security needs.
  • Created quarterly newsletters for the Information Security department of I.T.
  • Trained new information security administrators on process flows, administration of applications, and customer support roubleshooting.
  • Served as primary consultant and expert resource as Information Security Administrator using CA-Top Secret at Freddiemac.
  • Monitored network traffic with security tools such as Wireshark Report to Vice President of Information Security.
  • Train and educate computer and network users on information security to maintain situational awareness.
  • Coordinate with Xapiens and Information Security Department strategies to decrease the vulnerability of the company's computer systems.

Show More

1,817 Information Security Jobs

No jobs at selected location

3. Ensure Compliance
demand arrow
high Demand
Here's how Ensure Compliance is used in Information Security Administrator jobs:
  • Assist in implementing Quality Control procedures and training manual to ensure compliance with internal and external auditor controls.
  • Risk & Control Self-Assessment (RCSA) - Implemented RCSA to ensure compliance with corporate standards and polices.

Show More

407 Ensure Compliance Jobs

No jobs at selected location

4. Active Directory
demand arrow
high Demand
Here's how Active Directory is used in Information Security Administrator jobs:
  • Created new security groups in Active Directory environment and applied appropriate security permissions.
  • Performed Administration using SMS Administration Console and Active Directory
  • Supported end user's requests for password resets, group membership and drive mappings in Active Directory ID creation.
  • Administer and maintain enterprise active directory structure, user accounts, security permissions and group policy.
  • Provision access for Active Directory, Lotus Notes, Unix, VPN, OIM, Mainframe.
  • Developed organizational units in Active Directory (AD) and managed user security with group policies.
  • Administered Active Directory users (300+) for main office and several branch offices.
  • Provide ongoing leadership to revise/clean/update the Active Directory, Windows, and Database environments.
  • Utilized active directory to build LAN accounts and give access to applications as needed.
  • Performed cross platform audits of Active Directory (AD) objects and user permissions.
  • Monitor Active Directory accounts, user groups, GPO's and folder access.
  • Provided third level help desk support for problems relating to Active Directory.
  • Administer user accounts and profiles in Active Directory and Exchange accounts.
  • Added, deleted and reset passwords in Active Directory.
  • Review and analyze active directory accounts to ensure compliance.
  • Completed various Active directoryfile-shareExchange cleanup projects to reduce administration cost.
  • Manage corporate Network Servers using Active Directory and Webadmin.
  • Key Achievements: * Supported Access administration for infrastructure systems including Active Directory, Windows and Unix.
  • Created a custom vbscript to update Active Directory using information pulled from HR database.
  • Create ou's, users in Active Directory, Novell and Bio Netrix using MMC and Novell Admin.

Show More

1,340 Active Directory Jobs

No jobs at selected location

5. Windows XP
demand arrow
high Demand
Here's how Windows XP is used in Information Security Administrator jobs:
  • Provide internal software issues in user's desktop on Windows XP and Windows 7 platforms.

Show More

6 Windows XP Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary
6. Random Audits
demand arrow
high Demand
Here's how Random Audits is used in Information Security Administrator jobs:
  • Brake down and restacked merchandise from pallets during random audits.
  • Restacked merchandise from pallets during random audits.

Show More

7. Mainframe
demand arrow
high Demand
Here's how Mainframe is used in Information Security Administrator jobs:
  • Monitor all operational processes & procedures supporting mainframe applications and batch jobs executing on a variety of technical platforms.
  • Developed and implemented controls for monitoring mainframe and network violations, failures and intrusions.
  • Lead Documentation Controller for the Delphi Automotive Mainframe computer systems.
  • Supervised security administrators on the mainframe and data warehousing team.
  • Provided application level security for over 20 mainframe applications.
  • Assisted management with reviewing, documenting, evaluating and testing general controls in mainframe, mid-range and client/server environments.
  • Created and maintained all LAN, mainframe, and remote access accounts for every AmSouth employee.
  • Maintain and create mainframe entries for users as well as granting access to various mainframe applications.
  • Create users in Mainframe, NT and assign the appropriate access according to group membership.
  • Trained new employees on Mainframe and VAX application processes utilizing the EDS training model.
  • Administered data security support for mainframe (MVS) security software (CA-ACF2).
  • Supervised a team of six security administrators on the mainframe team.
  • Trained new security team members on Mainframe and VAX application processes.
  • Assist in maintaining PERMAC Mainframe for Chemical Hygiene department.
  • Trained new employees on Mainframe and VAX application processes.
  • Supervised three security administrators on the Mainframe team.
  • Executed user requests for access to Network, Mainframe, and Midrange computing systems and applications.
  • Provided problem resolution for mainframe and network helpdesk, including on-call functions.
  • Reset NT, Novell and Mainframe accounts for local and international users.
  • Created user ID's and granted application access on mainframe, Novell/NT, and UNIX/Sybase systems.

Show More

62 Mainframe Jobs

No jobs at selected location

8. Database
demand arrow
high Demand
Here's how Database is used in Information Security Administrator jobs:
  • Administered operations and systems analyses; extracted and interpreted data from multiple databases for report generation and metrics.
  • Controlled and maintained access to secure areas; updated/maintained personnel security databases (Database management).
  • Updated and maintained Security database with supplied data to ensure integrity and accuracy of client information.
  • Maintained computerized bibliography system and address database.
  • Installed, and trained employees on remote-access to client servers and various client database systems; troubleshot IT issues.
  • Performed audits of Network accounts and RACF members to ensure data integrity using databases and spreadsheet applications.
  • Develop and maintain Microsoft Access databases to store and report on information pulled from DB2 mainframes.
  • Create Crystal reports from an Access database to reduce days-long process to minutes.
  • Create and update various reporting processes along with maintaining related spreadsheets and databases.
  • Created, modified, and terminate Linux/UNIX and Oracle database accounts.
  • Gathered, maintained and cross referenced data from various product databases.
  • Grant access to data repository systems, applications and databases.
  • Use of Entrust software and Entrust database for system administration.
  • Design requested reports from Oracle databases using Crystal Reports.
  • Create and maintain database to track casino records.
  • Develop and maintain corporate security databases including RACF and supersession.
  • Used the IBM Tivoli Identity Management (ITIM) to administer Unix Servers, AD, Mainframes and Database.
  • Worked to establish a new client database Located and input client information into database Provided assistance for various office duties as needed
  • tApplied problem solving skills combined with knowledge of networking, database, and desktop technologies and configurations to produce secure solutions.
  • Experience in flattening XML files and profimg through Information Analyzer connecting to Teradata database.

Show More

7,437 Database Jobs

No jobs at selected location

9. Security Policies
demand arrow
high Demand
Here's how Security Policies is used in Information Security Administrator jobs:
  • Migrated, installed, and secured application programs adhering to established and published security policies and audit guidelines enabling rapid productivity.
  • Created and fine-tuned security policies facilitating user understanding of policies and procedures, allowing successful audit results.
  • Maintained/administered security policies and procedures as required by DOD and National level guidance.
  • Developed and implemented security policies to help the organization conform to standards.
  • Reviewed and security policies and made recommendations on virus protection strategies.
  • Provided education and encouraged adherence to security policies & IT standards.
  • Promote security best practices and understanding of internal security policies.
  • Provided input for corporate information security policies and procedures.
  • Created/revised executive summaries for existing security policies and guidelines.
  • Respond to inquiries regarding security policies and procedures, and assist users daily with understanding the importance of IT security.
  • Assist in the development and maintenance of all IT security policies, procedures, and regulatory compliance requirements.
  • Assisted in planning, implementing and enforcing security policies for the protection of data and shared network resources.
  • Participate and assist in the design and implementation of data security policies, standards, and guidelines.
  • Assisted in researching and drafting of Security Policies within the company.
  • Ensured compliance of IT Security Policies.
  • Established and implemented IT and Information Security policies and procedures that support best practices within Healthcare IT.

Show More

1,616 Security Policies Jobs

No jobs at selected location

10. User Accounts
demand arrow
high Demand
Here's how User Accounts is used in Information Security Administrator jobs:
  • Performed administrative duties in Good Samaritan Directory Service r/t user accounts.
  • Managed User Accounts on WindowsNT and UNIX Platform (Creation, Deletion, Permissions, and VPN Access).
  • Reviewed added, disabled, deleted, and modified end user accounts for all applications on daily basis.
  • Create new user accounts based on roles within the company, access levels and monetary trading limits.
  • Followed set procedures with regards to adding and deleting user accounts and processed access change requests.
  • Create and maintain Thomson Reuters user accounts for access to investment tools and information.
  • Created network user accounts, Exchange email accounts, and banking application accounts.
  • Create and maintain new and existing user accounts on the network infrastructure.
  • Manage distribution of software tokens, user accounts, access groups.
  • Created user accounts, passwords and security levels for end-users.
  • Review and analyze end user accounts to ensure compliance.
  • Mapped and merged user accounts.
  • Administer and maintain User Accounts.
  • Managed user accounts as needed.
  • Created new user accounts in AD, AS400, NT, Novell and various other applications.
  • Major Accountabilities Implements and manage security, access rights, and user accounts for health facilities.

Show More

191 User Accounts Jobs

No jobs at selected location

11. ISA
demand arrow
high Demand
Here's how ISA is used in Information Security Administrator jobs:
  • Monitor and communicate changes in regulations and legislation that affect Information Security and other areas of Risk Management and Disaster Recovery.
  • Developed and successfully executed disaster recovery plan for all UNIX systems at off-site recovery facility.
  • Performed periodic disaster recovery tests and participated in after action reviews.
  • Created all documentation associated with the Disaster Recovery Plan.
  • Support Disaster Recovery and Business Continuity efforts.
  • Performed regularly scheduled disaster recovery tests.
  • Assist in the design and implementation of disaster recovery and business continuity plans, procedures, audits, and enhancements.
  • Collaborated with CTI-Global Business Continuity Services and ISA managers to develop COB strategy, test plans, and test scripts.
  • Processed modification requests such as enable or extend suspended, disabled or expired accounts and termination of active accounts.
  • Remain on call 24/7 to diagnose and troubleshoot any technical problems in any disaster recovery plans.
  • Supported Microsoft Exchange servers by creating, modifying, deleting, or disabling user Outlook accounts.
  • Participated in ISA and Engineer group meetings regarding testing and functionality enhancement of enterprise CA.
  • Utilized VBS Scripts to remove disabled Active Directory accounts from the domain.
  • Created, modified, disabled, and deleted user accounts in Exchange.
  • Developed a robust and comprehensive metrics reporting process for ISA.
  • Interfaced with Corporate Security Department on all IT related security investigations Reviewed and updated Disaster Recovery Plan, attended Business Continuity meetings
  • Led teams that ensured compliance with a myriad of regulatory requirements (HIPPA, VISA PCI, FERPA, GLBA ).
  • Ensured full compliance with legal and regulatory requirements (FERPA, GLBA, HIPPA, VISA PCI )
  • Enforced DISA Stig requirements for software and hardware installed on wing and base infrastructure.
  • Developed the IT departments Disaster Recovery Plan.

Show More

52 ISA Jobs

No jobs at selected location

12. Information Technology
demand arrow
high Demand
Here's how Information Technology is used in Information Security Administrator jobs:
  • Increased productivity of bank employees by managing information technology applications for high availability and reliable performance.
  • Provide information technology system fault isolation and/or root-cause analysis, and recommend corrective actions.
  • Coordinate and monitor all aspects of the credit unions IS program in conjunction with Information Technology personnel.

Show More

2,701 Information Technology Jobs

No jobs at selected location

13. User Access
demand arrow
high Demand
Here's how User Access is used in Information Security Administrator jobs:
  • Maintained security for all centrally protected on-line resources and user access profiles using established tools and security guidelines.
  • Assist management in developing and implementing provision procedures and policies to govern logical user access.
  • Supported critical initiative to complete in record time the user access re-certification process
  • Performed quarterly audits regarding user access levels.
  • Provide guidance and consultation for user access security related questions from users, developers, and managers, and facility security.
  • Create and maintain user access to multiple systems, AS/400, Active Directory (AD) and Websites.
  • Provided high level security support in a fast pace environment to ensure 24 hour business user access.
  • Provided seven day on-call support of application and user access and reporting provisioning for employees and clients.
  • Maintain and control end user access through CITRIX, web portals, and ticketing systems.
  • Designed user access security levels for employees and external clients.
  • Created User Access Provisioning Policy, Procedure, and Forms.
  • Assisted with user access audits.
  • Conducted user access reviews monthly and monitored user folder/file activity using Varonis.
  • Performed Troubleshoot user access issues and provided access recertification.
  • Provided and managed user access to owner/project folders, Jobscope, Customer Portals and TeamCenter.
  • Provided management with audit reports and adhoc review of user access.
  • Perform user access certifications to ensure compliancy with internal IT Control Policies and government regulations.

Show More

146 User Access Jobs

No jobs at selected location

14. Unix
demand arrow
high Demand
Here's how Unix is used in Information Security Administrator jobs:
  • Worked closely with System Engineers during the implementation of UNIX service-oriented architecture.
  • Developed Minimum Security Baselines for corporate Windows and UNIX systems in accordance with CIS, NIST, and Microsoft guidelines.
  • Create LDAP Server accounts to servers that allow single sign on authentication to Windows, Linux and Unix servers.
  • Act as server administrator in a variety of environments to include VMware, Windows 2003/2008 and UNIX.
  • Manage UNIX accounts and permissions for users and groups in Solaris10 which include Bourne, Korn, and Bash Shells.

Show More

1,540 Unix Jobs

No jobs at selected location

15. Desk Support
demand arrow
average Demand
Here's how Desk Support is used in Information Security Administrator jobs:
  • Provided first level telephone help desk support to Quarterdeck customers worldwide concerning company products.
  • Provided Help Desk support to United States for the Defense Security System a branch in the DoD.
  • Provide help desk support for system access problems and failed system jobs for Greyhound associates and clients.
  • Provided Help Desk support for a command of 500+ government, military, and contractors.

Show More

13 Desk Support Jobs

No jobs at selected location

16. SQL
demand arrow
average Demand
Here's how SQL is used in Information Security Administrator jobs:
  • Created and manage accounts as necessary for access to SQL, Oracle, FTP and Business Objects access.
  • Added Active Directory, Mainframe, Unix, and SQL accounts to various servers and databases.
  • Administered Active Directory, Group Policy, MS SQL Server, and Juniper network firewalls.
  • Create CLs scripts and utility programs using SQL/400, Query/400, QM, and DBU.

Show More

9,559 SQL Jobs

No jobs at selected location

17. Security Awareness
demand arrow
average Demand
Here's how Security Awareness is used in Information Security Administrator jobs:
  • Coordinate annual company wide event Security Awareness week, another initiative to raise IT security awareness, involving all remote offices.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Ensured an audit-compliant security environment by implementing appropriate policy, procedures, and a security awareness program.
  • Project Manager for Information Security training program for New Hire Orientation and Security Awareness Training Program.
  • Created and presented training materials for information security awareness seminars for bank employees.
  • Assisted in developing a Security Awareness Campaign within the company.
  • Assisted training department in updating annual security awareness education.
  • Developed and managed company-wide Security Awareness Training Program.
  • Administered annual Security Awareness training for the organization.
  • Develop security awareness and training for employees.
  • Worked with marketing to create Security Awareness pamphlets and posters to distribute to corporate office, ships and remote offices.
  • Implemented training courses for associates and new recruits to raise security awareness.
  • Developed and presented the security awareness briefings to our company wide employees.
  • Create and propagate security awareness and training programs among employees.
  • Created Security Awareness Training program from the ground up.
  • Initiated the annual National Cyber Security Awareness Month program.
  • Developed & presented Security Awareness Training for 800 Choicepoint employees.

Show More

143 Security Awareness Jobs

No jobs at selected location

18. Access Control
demand arrow
average Demand
Here's how Access Control is used in Information Security Administrator jobs:
  • Worked on developing and implementing Logical Users Access Control documentation to provision access for approximately 130 business applications.
  • Provide one-one-one support for customers on security access controls of core applications and systems.
  • Updated company procedures governing corporate security, access control, and incident response.
  • Implemented company-wide role-based access control through Active Directory.
  • Audited data security policies and user access controls.
  • Evaluate security features of new software to ensure compliance with access control policies, prior to deployment into environment.
  • Provide access control for network shares, local area networks, SharePoint 2013, and e-mail communications.
  • Access Control Administration - Created and terminated user accounts in Windows XP, 2010 and UNIX.
  • Implemented Microsoft Active Directory best practices for role-based access control, and software deployment.
  • Deploy new systems and network devices to include provisioning of access controls and monitoring.
  • Implemented and supported the SAP GRC Access control tool.
  • Reviewed backup of CCTV and access control logs.15.
  • Provide technical advice on access control.

Show More

182 Access Control Jobs

No jobs at selected location

19. VPN
demand arrow
average Demand
Here's how VPN is used in Information Security Administrator jobs:
  • Inspect all CISCO PIX / ASA / FortiGate Firewall ACL and VPN configuration setting using CIS-CAT Benchmark Assessment Tool.
  • Developed and deployed security policies for users and computers directly attach to corporate network, site to site and SSL VPNs.
  • Designed and implemented remote access VPN solutions including client side SSL and Cisco IPsec site to site connections.
  • Controlled remote access to network resources via Contivity VPN dial-in client and Cisco RADIUS Server.
  • Remediated 30+ end-of-life disk arrays, firewalls, VPN's, routers, and switches.
  • Applied OpenVPN project management techniques and tools sufficient to provide technical guidance on the implementation of Samba Domain Controller emerging technologies.

Show More

625 VPN Jobs

No jobs at selected location

20. SOX
demand arrow
average Demand
Here's how SOX is used in Information Security Administrator jobs:
  • Work with auditors to gather the proper information for PCI and SOX audits and submit the information in timely required manner.
  • Reviewed all PCM documentation and performed gap analysis against the CITMP, SOX and FFIEC requirements to ensure standards were met.
  • Ensured all processes were in compliance with Sarbanes-Oxley (SOX) controls and maintained passing SOX tests for duration.
  • Conducted weekly and quarterly audits to ensure company and Sarbanes-Oxley (SOX) compliance standards were met.
  • Project lead for new user access review process for SOX, GLBA and various controls.
  • Collected, distributed and archived reports and extracts for Sarbanes-Oxley (SOX) compliance.
  • Worked audits of other security departments to confirm SOX compliance.
  • Perform security reporting - Sarbanes-Oxley (SOX).
  • Performed SOX and GLBA compliance testing.
  • Participate in audits, PCI, SAS70, and SOX
  • Reviewed and wrote scripts using Compuware QA Director testing tool to support and comply with SOX audit requirements.
  • Work closely with auditing to ensure security controls are in place for SOX and HIPAAcompliance regulatory requirements.
  • Provided daily reports for SOX and PCI compliance Accomplishments: Implementation of Lumigent Audit DB for SOX compliance auditing and maintenance.

Show More

40 SOX Jobs

No jobs at selected location

21. Incident Response
demand arrow
average Demand
Here's how Incident Response is used in Information Security Administrator jobs:
  • Performed event correlation and present detailed documentation to Incident Response Team for investigation.
  • Carried out initial incident response and digital forensic analysis of compromised systems.
  • Developed/implemented improved incident response policies and procedures.
  • Established and supported the policies and processes for IT and Information Security Incident Response.
  • Participate as a member of a computer security incident response team.
  • Performed structured walk through testing of incident response plan scenarios.
  • Created all documentation associated with the Incident Response Plan.
  • Develop,maintain, and communicate security policies and procedures; advise on best practices;Coordinate incident response.

Show More

1,017 Incident Response Jobs

No jobs at selected location

22. Technical Support
demand arrow
average Demand
Here's how Technical Support is used in Information Security Administrator jobs:
  • Provided technical support for systems and applications within the organization.
  • Provided problem resolution for escalated issues identified by Technical Support Group - 2nd level support.
  • Provided level 2 technical support for end-users and the help desk.
  • Provide technical support to over 600 staff members while maintaining hardware and
  • Provide Server/technical support to IT Security team for their applications.
  • Developed training programs for technical support staff and end users.
  • Provided excellent computer and technical support to end users.
  • Provided technical support via ServiceNow ticketing system to 100+ Datafort environments globally.

Show More

2,238 Technical Support Jobs

No jobs at selected location

23. Security Access
demand arrow
average Demand
Here's how Security Access is used in Information Security Administrator jobs:
  • Reviewed security accesses/definitions to insure validity and take appropriate actions.
  • Researched and responded to inquiries regarding Security Access Reviews.
  • Review and monitor monthly security access violation activity report.
  • Created and implemented new security process to insure new and existing security access is not compromised for client and employee information.
  • Provide proper security access for all users and groups of Franciscan Alliance for operating systems, databases, and applications.
  • Provide assistance to internal and external clients in the creation, modification, and loss of security access.
  • Administered security access, for First Union employees nationwide, to various mainframe and AS/400 based applications.
  • Administered Mainframe/LAN Systems and application security access for over 20,000+ plus employees of this Fortune 500 Company.
  • Coordinate with IT Management to review and update IT security access scenarios.
  • Track and supervise security access requests from new and existing system users.
  • Maintained database of all data security access for over 2,000 employees.
  • Processed security access requests accurately and in a timely manner.
  • Provided extensive service among A.I.G employees for password resets and changes and removed suspensions for production & model security access.

Show More

32 Security Access Jobs

No jobs at selected location

24. Troubleshoot
demand arrow
average Demand
Here's how Troubleshoot is used in Information Security Administrator jobs:
  • Review Problem Management type systems to troubleshoot and resolve security related issues.
  • Monitor ticketing queue, validate ticket information to properly troubleshoot incident.
  • Provide advanced support and troubleshooting for users and customers with access issues after local Help Desk has escalated on issue.
  • Experience supporting and troubleshooting Priority 1 tickets within 30 minute window on issues that may cause a significant financial impact.
  • Provided key support via hardware/application troubleshooting and, utilizing a trouble ticket system for global customers with access issues.
  • Install, test and troubleshoot regular and custom made applications and train clients on different functions of the application.
  • Handled technical troubleshooting within an enterprise environment, including system crashes, slow-downs and data recoveries.
  • Perform tasks of defining users to all systems, granting access rights and troubleshooting security issues.
  • Oversee installation, configuration, maintenance, and troubleshooting of core and peer file sharing.
  • Handle access, troubleshooting, and problem resolution for employees, contractors and clients.
  • Manage, audit and troubleshoot infrastructure security technology such as anti-virus, scan alert.
  • Update Troubleshooting Guide (TSG) procedures, communicating with internal customers.
  • Analyze, troubleshoot, and resolve trouble tickets pertinent to system access.
  • Help Desk Phone Support: computer, printer and software troubleshooting.
  • Work with role based access, by creating and maintaining role templates Troubleshoot access issues, via CA Service Desk Manager.
  • Experience in Information server Administration System Admin issues which needs to be troubleshooted:.
  • Group Policy Configuration for Juniper NetScreen / Windows AD Troubleshooting Corporate Network issues.
  • Assisted helpdesk with Apache Web Server troubleshooting problems and implementing changes on multifaceted and interdependent computer eJabberd IM Server platforms.

Show More

1,601 Troubleshoot Jobs

No jobs at selected location

25. IDS
demand arrow
average Demand
Here's how IDS is used in Information Security Administrator jobs:
  • Processed system access requests including building new ids, changing existing system access, processing deletes and trouble-shooting password issues.
  • Generated intrusion detection reports via SNORT IDS servers and analyzed via BASE Web UI.
  • Monitor all company systems for threats using Network IDS/IPS and Host Based IDS/IPS.
  • Utilized Security tools such as IDS and IPS, sniffers and malware analysis tools.

Show More

497 IDS Jobs

No jobs at selected location

26. Security Issues
demand arrow
average Demand
Here's how Security Issues is used in Information Security Administrator jobs:
  • Review requested enterprise change management processes and accept changes or suspend requested operations pending remediation of discovered security issues.
  • Review security event logs and follow through any identified potential security issues to resolution.
  • Resolve security issues on network using Microsoft Baseline Security Analyzer.
  • Provided problem-resolution to assist users with access and security issues.
  • Review requested enterprise change management processes/activities for security issues.
  • Support site administrators with daily security issues.
  • Risk assessment management by identifying cause of security issues, impact to business, and determining required corrective actions.
  • Managed risk by analyzing the root cause of security issues, impact to business, and required corrective actions.
  • Worked closely with IT Compliance to resolve data security issues for various system applications.
  • Assist with projects involving database and security issues and requirements.
  • Monitored ticketing system for security issues, and possible threats.
  • Provided level II support of escalated security issues.

Show More

903 Security Issues Jobs

No jobs at selected location

27. PCI
demand arrow
average Demand
Here's how PCI is used in Information Security Administrator jobs:
  • Minimized PCI scope, and reached University wide PCI compliance which has been sustained for the last 5 years.
  • Performed annual PCI review and provided the corresponding annual assessment for PCI validation with contracted credit card Services Company.
  • Installed Sentinel (Security Information & Event Management) system as part of the PCI-DSS compliance initiative.
  • Assisted with 2008 and 2009 PCI Audit preparations and procedures.
  • Project Manager responsible for the 2 year rollout of the Payment Card Industry (PCI) compliance program.

Show More

88 PCI Jobs

No jobs at selected location

28. Lotus Notes
demand arrow
average Demand
Here's how Lotus Notes is used in Information Security Administrator jobs:
  • Supported different ESAT applications like Aria/OLA, Oracle 8i Enterprise Security Manager, Lotus Notes 6.0, On Demand.
  • Assisted the Networking team and Lotus Notes teams on security verification.
  • Administer and monitor security infrastructure for Novell NetWare and Lotus Notes systems.
  • Led a team of Test Analysts Used Lotus Notes during my 12 years at Vanguard

Show More

43 Lotus Notes Jobs

No jobs at selected location

29. RSA
demand arrow
average Demand
Here's how RSA is used in Information Security Administrator jobs:
  • Manage RSA Authentication Manager System.
  • Executed administration and configuration of RSA two factor authentication for VPN, NERC/CIP, Jump Servers and Firewalls.
  • Directed and oversaw all aspects of the department, as part of the corporate leadership team.
  • Trained multiple client teams on processes and programs such as RSA SecurID and Mainframe applications.
  • Managed user configuration and distribution of remote access tokens (RSA SecurID).
  • Configure and support VPN clients RSA Software tokens for remote users.
  • Perform security audits for internal systems (AD, RSA)
  • Processed RSA token requests from financial institutions, including setup of login and password, with high attention to detail.
  • Experience administering Active Directory, RSA, Outlook, Lotus Notes, LDAP/siteminder.

Show More

2 RSA Jobs

No jobs at selected location

30. Security Systems
demand arrow
low Demand
Here's how Security Systems is used in Information Security Administrator jobs:
  • Provided technical services for the support of integrated security systems.
  • Maintained security on all proprietary and vendor-supplied application security systems.
  • Monitor and configure security systems, including but not limited to IPS, VPN, SIEM
  • Initiated and managed the knowledge transfer and transition of new security systems.
  • Conduct routine audits on our security systems to ensure systems integrity.
  • Network and PC security systems.
  • Managed/Installed biometric security systems and video surveillance systems.
  • tAssisted in the assessment, knowledge transfer, and transition of new security systems.

Show More

409 Security Systems Jobs

No jobs at selected location

31. Racf
demand arrow
low Demand
Here's how Racf is used in Information Security Administrator jobs:
  • Cross trained on ACF2, RACF, and other teams' applications to help support when needed.
  • Participated in ACF2 to RACF security system conversion.
  • Created and modified dataset profiles, RACF groups, and various RACF components.

Show More

7 Racf Jobs

No jobs at selected location

32. Hipaa
demand arrow
low Demand
Here's how Hipaa is used in Information Security Administrator jobs:
  • Led risk assessment and remediation projects to ensure compliance with Health Insurance Portability and Accountability Act (HIPAA) requirements.
  • Created and conducted HIPAA training program for executive management and general staff.
  • Established HIPAA policies and procedures and implemented system measures to ensure compliance.
  • Maintained compliance and HIPAA best practices
  • Experienced working within various regulatory guidelines (PCI,HIPAA) to maintain proper corporate posture for compliance.
  • Maintain HIPAA/HITECH & PCI compliance and security for servers, endpoints, networkinfrastructure, and mobile devices.

Show More

7 Hipaa Jobs

No jobs at selected location

33. Customer Service
demand arrow
low Demand
Here's how Customer Service is used in Information Security Administrator jobs:
  • Received numerous awards for Customer Service issue resolution.
  • Provide excellent customer service to internal Vanguard employees with their network security needs and troubleshooting and solving their issues.
  • Analyze and resolve security issues; provide customer service and support, security awareness and training.
  • Provided customer service support of Windows 10, 7, XP and 2000.
  • Provide excellent and timely customer service to home office and external customers.
  • Received multiple rewards for customer service and teamwork.
  • Resolved time-critical situations utilizing extensive trouble-shooting experience/skills providing a baseline for customer service/satisfaction targets.
  • Created reports for account team and client Provided customer service by being an escalation point for client and internal teams..

Show More

873 Customer Service Jobs

No jobs at selected location

34. Remote Access
demand arrow
low Demand
Here's how Remote Access is used in Information Security Administrator jobs:
  • Assigned remote access security tokens and building access tokens to users and managed trouble tickets pertaining to these
  • Assisted Security Coordinators company-wide with the creation of Local Area Network and Remote Access Facility Accounts.
  • Administered remote access to the internal network.

Show More

434 Remote Access Jobs

No jobs at selected location

35. Product Descriptions
demand arrow
low Demand
36. Security Administration
demand arrow
low Demand
Here's how Security Administration is used in Information Security Administrator jobs:
  • Performed security administration functions across multiple platforms to support 35K end-users which included our Help Desk technical support area.
  • Assisted in developing and documenting security administration procedures and guidelines.
  • Administered multiple platform security administration for all bank employees.

Show More

126 Security Administration Jobs

No jobs at selected location

37. Audit Procedures
demand arrow
low Demand
1 Audit Procedures Jobs

No jobs at selected location

38. Linux
demand arrow
low Demand
Here's how Linux is used in Information Security Administrator jobs:
  • Administer all Security Servers (HP-UX, Linux, Solaris & Windows) and applications.

Show More

7,652 Linux Jobs

No jobs at selected location

39. Sharepoint
demand arrow
low Demand
Here's how Sharepoint is used in Information Security Administrator jobs:
  • Document and maintain all security related policies and procedures via MS OfficeSharePoint.
  • Updated RSA token security contact list to SharePoint.
  • Key Results: Administration of Active Directory, Network Shares, SharePoint and Corporate applications.

Show More

125 Sharepoint Jobs

No jobs at selected location

40. Security Patches
demand arrow
low Demand
Here's how Security Patches is used in Information Security Administrator jobs:
  • Ensured all security patches (IAVA's) and anti-virus program was up to date.
  • Developed procedures for and performed hardening of workstations via removal of non-essential services, security patches, software updates, etc.

Show More

130 Security Patches Jobs

No jobs at selected location

41. Security Violations
demand arrow
low Demand
Here's how Security Violations is used in Information Security Administrator jobs:
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitor LAN and Mainframe access for security violations.
  • Inform IAMs on all IA security violations and incidents.

Show More

42. Pre-Shift Checks
demand arrow
low Demand
Here's how Pre-Shift Checks is used in Information Security Administrator jobs:
  • Carried out pre-shift checks of equipment.
  • Performed pre-shift checks of equipment.

Show More

43. Access Management
demand arrow
low Demand
Here's how Access Management is used in Information Security Administrator jobs:
  • Experience using Identity Access Management and Remedy request systems.
  • Monitor Identity Management activity and issues on the portal and NAM environment and expediting issues to the Identity Access Management team.
  • Lead for centralized access management team to ensure appropriate access to all workers for a ~50,000 person organization.

Show More

459 Access Management Jobs

No jobs at selected location

44. Pallet Jack
demand arrow
low Demand
14 Pallet Jack Jobs

No jobs at selected location

45. Nessus
demand arrow
low Demand
Here's how Nessus is used in Information Security Administrator jobs:
  • Utilized security tools such as, Nessus 4.2 Vulnerability Scanner to support vulnerability assessments.
  • Performed vulnerability scans and analysis using Tenable Nessus vulnerability scanning tool.
  • Execute Nessus vulnerability scans and create reports for management review.
  • Interacted with internal Incident Response Team to coordinate remediation efforts Compiled and collected reports on vulnerability scan results using Tenable Nessus.
  • Conducted vulnerability assessments via Nessus and data packet analysis with Wireshark.

Show More

275 Nessus Jobs

No jobs at selected location

46. Access Rights
demand arrow
low Demand
Here's how Access Rights is used in Information Security Administrator jobs:
  • Provided Identity management by adding and removing privilege access rights and permissions to end users.
  • Created distribution lists, updated access groups, and configured file access rights.

Show More

1 Access Rights Jobs

No jobs at selected location

47. LAN
demand arrow
low Demand
Here's how LAN is used in Information Security Administrator jobs:
  • Performed a comprehensive Business Impact Assessment (BIA) which ensured recovery planning efforts were aligned with organizational objectives.
  • Well balanced security/functionality standardized configurations in desktops and server: NIST-MS FDCC (Federal Desktop Core Configuration).
  • Create and maintain long-term plans and strategies detailing security infrastructure improvements.
  • Executed principles and methods used for planning and managing the implementation, update, and integration of information system components.
  • Provide planning, support and provisioning for weekly Change Implementation events after hours to reduce potential impact during business hours.
  • Perform duties, such as taking care of plants or straightening magazines to maintain lobby or reception area.
  • Authored, implemented, and evaluated three Emergency Action Plan (EAP) scenario drills for site personnel.
  • Lead, mentor, plan and implement cross-training programs for our team to improve operational readiness.
  • Work closely with WAN, LAN and client server system administrators, users and applications.
  • Support the Distributed Systems group in evaluating new products and development project plans for implementation.
  • Configure and maintain Wireless LAN controller and access points for remote and edge switches.
  • Assisted customers with upgrade purchases and determining the appropriate plans for their needs.
  • Reviewed, analyzed, and executed test plans/matrices for user acceptance testing.
  • Provided information about our services, plans, features, and products.
  • Created/maintained VLANS, DNS, and IP assignment to standard naming conventions.
  • Monitor WAN/LAN activity to identify activity and latency on the network.
  • Work with remote sites to establish and maintain LAN/WAN connectivity.
  • Planned, documented, configured and implemented the system.
  • Validated FISMA reportable risk annotated within the Plan of Action and Milestones (POA&Ms).
  • Design LANs for remote sites.

Show More

1,628 LAN Jobs

No jobs at selected location

48. Security Incidents
demand arrow
low Demand
Here's how Security Incidents is used in Information Security Administrator jobs:
  • Assisted in the identification, reporting, and investigation and documenting of security incidents in accordance with applicable policies and directives.
  • Responded to security incidents, identified & communicated findings.
  • Presented trend analysis of security incidents for Chennai sites.23.
  • Responded to IT security incidents and investigations as needed.
  • Analyzed security incidents and kept appropriate documentation.
  • Answered, screened, and directed calls concerning information security incidents.
  • Investigate Security Incidents and resolve to closure.
  • Reviewed IT incidents (IMs raised) to identify security incidents, if any.14.

Show More

736 Security Incidents Jobs

No jobs at selected location

49. Sarbanes-Oxley
demand arrow
low Demand
Here's how Sarbanes-Oxley is used in Information Security Administrator jobs:
  • Developed and maintained corporate IT security and governance policies to align with Sarbanes-Oxley compliance.
  • Applied knowledge of international data protection laws; conducted internal, external, and Sarbanes-Oxley audit assessments.
  • Play a pivotal role in ensuring IT department's compliance with Sarbanes-Oxley.

Show More

50. Individual Items
demand arrow
low Demand
Here's how Individual Items is used in Information Security Administrator jobs:
  • Use a headset or pick sheet to find out individual items inside warehouse.

Show More

Information Security Administrator Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For An Information Security Administrator

Security Procedures

11.5%

Information Security

9.8%

Ensure Compliance

9.4%

Active Directory

9.1%

Windows XP

7.9%

Random Audits

5.5%

Mainframe

5.1%

Database

5.1%

Security Policies

5.0%

User Accounts

3.5%

ISA

3.1%

Information Technology

3.1%

User Access

3.0%

Unix

2.9%

Desk Support

2.8%

SQL

2.7%

Security Awareness

2.7%

Access Control

2.6%

VPN

2.6%

SOX

2.5%
Show More

Typical Skill-Sets Required For An Information Security Administrator

Rank Skill
1 Security Procedures 7.9%
2 Information Security 6.7%
3 Ensure Compliance 6.5%
4 Active Directory 6.3%
5 Windows XP 5.5%
6 Random Audits 3.8%
7 Mainframe 3.5%
8 Database 3.5%
9 Security Policies 3.4%
10 User Accounts 2.4%
11 ISA 2.1%
12 Information Technology 2.1%
13 User Access 2.1%
14 Unix 2.0%
15 Desk Support 1.9%
16 SQL 1.9%
17 Security Awareness 1.9%
18 Access Control 1.8%
19 VPN 1.8%
20 SOX 1.7%
21 Incident Response 1.6%
22 Technical Support 1.5%
23 Security Access 1.5%
24 Troubleshoot 1.4%
25 IDS 1.4%
26 Security Issues 1.4%
27 PCI 1.4%
28 Lotus Notes 1.3%
29 RSA 1.3%
30 Security Systems 1.2%
31 Racf 1.1%
32 Hipaa 1.1%
33 Customer Service 1.1%
34 Remote Access 1.0%
35 Product Descriptions 0.9%
36 Security Administration 0.9%
37 Audit Procedures 0.9%
38 Linux 0.9%
39 Sharepoint 0.9%
40 Security Patches 0.9%
41 Security Violations 0.9%
42 Pre-Shift Checks 0.8%
43 Access Management 0.8%
44 Pallet Jack 0.8%
45 Nessus 0.8%
46 Access Rights 0.8%
47 LAN 0.8%
48 Security Incidents 0.7%
49 Sarbanes-Oxley 0.7%
50 Individual Items 0.7%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

19,880 Information Security Administrator Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.