Security Administrator

Top Security Administrator Skills

Below we've compiled a list of the most important skills for a Security Administrator. We ranked the top skills based on the percentage of Security Administrator resumes they appeared on. For example, 10.5% of Security Administrator resumes contained Security Procedures as a skill. Let's find out what skills a Security Administrator actually needs in order to be successful in the workplace.

The six most common skills found on Security Administrator resumes in 2020. Read below to see the full list.

1. Security Procedures

high Demand
Here's how Security Procedures is used in Security Administrator jobs:
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Created audit procedures and schedules for proactively auditing against new security procedures and policies.
  • Maintained and implemented all Security Administrative and Physical Security/Computer Security Procedures for classified processing.
  • Provided administrative oversight and assistance on security procedures and regulations to support staff.
  • Developed risk assessments and implementation of appropriate data security procedures and products.
  • Promoted and trained Systems Administrators on security awareness and security procedures.
  • Implement continuous security procedures in coordination with government agencies and management.
  • Perform administrative duties in support of security procedures and requirements.
  • Establish security procedures required on banking applications and programs.
  • Help develop concepts and policies to maintain/improve security procedures.
  • Develop and enforce security procedures and regulations.
  • Provided technical support to client, management and staff for risk assessment and the implementation of data security procedures for products.
  • Reviewed and approved foreign visitor requests, acted as an escort and ensured security procedures were followed to prevent classified spillages.
  • Developed 30 security procedures and created 35 emergency flowcharts within 60 days of hire to improve performance and security integrity.
  • Applied computer and security procedures expertise to maintain the computer database system for employee's clearances and visit authorization.
  • Monitored security procedures; ensured compliance with all aspects of the program.
  • Trained new and senior employees on new security procedures.
  • Helped new officers learn and understand the security procedures.
  • Implemented proper security procedures in order to protect the public and ensuring prohibited items are not transported on aircrafts.
  • Developed and maintained security procedures, guidelines and workflows for the IT Identity and Access Management process.

Show More

2. Joint Personnel

high Demand
Here's how Joint Personnel is used in Security Administrator jobs:
  • Reviewed Joint Personnel Adjudication System daily to determine if candidate received an interim clearance.
  • Updated security records of current and termed employees (IN/OUT process) in JPAS (Joint Personnel Adjudication System).
  • Have experience in navigating through the Joint Personnel Adjudication System (JPAS) and submitting request for personnel security clearances.
  • Received visitors and verified Security Clearance/Accesses via the Joint Personnel Adjudication System (JPAS) and other access rosters.
  • Maintain Personnel Security Management Network (PSM) through the Joint Personnel Adjudication System (JPAS).
  • Maintained all employee security records in Joint Personnel Adjudication System (JPAS) with level 6 access.
  • Process track and monitor all visit requests using the Joint Personnel Adjudication System (JPAS).
  • Conduct Joint Personnel Access System (JPAS) research and inquiries daily to ensure compliance.
  • Coordinate fingerprinting and submission of required documentation Validated all records within the Joint Personnel Adjudication System (JPAS).
  • Camp Arifjan, Kuwait* Perform clearance verification using Joint Personnel Adjudication System (JPAS) with level 6 access.

Show More

3. Data Entry

high Demand
Here's how Data Entry is used in Security Administrator jobs:
  • Manage requests simultaneously for different Medicare regions via data center and electronic data entry personnel.
  • Utilized proprietary software; performed data entry and managed databases of customers.
  • Processed data entry, maintained shipment logs, properly processed daily log in logs for the visitors to sign each day.
  • Greet visitors, Manage busy phones, issue badges, data entry, edit documents, and conduct background checks.
  • Performed administrative duties which included answering calls, greeting clients, computer work, data entry and maintaining security.
  • Assess responses to data entry to BPP's tabs Biographical General, Biographical Personal, and Transactions Manager.
  • Keyed Decor mail and the Z's, balanced data entry, and corrected customer information mistakes.
  • Performed data entry, clerical duties, 10-key, mail distributing, and console receptionist.
  • Performed job duties such as data entry, operated warehouse machinery, and counted inventory.
  • Managed the activities of the cashier, assistant cashier, and several data entry clerks.
  • Performed accurate data entry duties in this entry-level banking office position as needed.
  • Locate and correct data entry errors, or report them to supervisors.
  • Handled data entry and tracking for every single KBR employee MNF-I application.
  • Keyed and verified important documents into the Data Entry Terminal.
  • Cashier, Receptionist, Data Entry, Computer Operations.
  • Provided customer service and data entry.
  • Program specific daily data entry.

Show More

4. Windows XP

high Demand
Here's how Windows XP is used in Security Administrator jobs:
  • Audit classified Linux/Unix, Windows 2003, 2008 servers, Windows XP and 7 machines on weekly basis.
  • Join Windows XP, and Windows 7 platform to domain.
  • Roll out new Windows XP Professional PCs and equipment.
  • Created, maintained and used several Windows XP "Ghost" images for packaging and testing.

Show More

5. Active Directory

high Demand
Here's how Active Directory is used in Security Administrator jobs:
  • Designed and implemented Active Directory and Group policy.
  • Trained new contract workers on Active Directory administration.
  • Maintained Active Directory settings in accordance with policy.
  • Access provisioning for employees at over 400 bank branches, to include Active Directory security, RACF/SGON and OIM.
  • Utilized active directory to provision shares, groups, folders, grant access to network resources, etc.
  • Monitor Windows and Active Directory servers to ensure disabled accounts are no longer presents on the servers.
  • Create and update process/procedure IT Security documents for platform/department tasks (Microsoft Windows and Active Directory).
  • Manage Windows 2000 active directory structures, and assign security permissions to files and folders.
  • Use Active Directory Users and Computers to manage local user admin accounts and computers.
  • Maintained access logs and monitored access through Active Directory for temporary and permanent employees.
  • Create, reset, and delete networking user profile in Active Directory.
  • Create users, groups, and machine accounts using Active Directory.
  • Modify network resources by using Active Directory group policies.
  • Created Global groups and Computers in Active Directory.
  • Created and maintained over 5,000 Active Directory accounts.
  • Installed and maintained Digital Persona Enterprise biometric authentication for Active Directory.
  • Provide support and administration of the Agency Active Directory (AD) in a Windows 2008 Server distributed environment.
  • Configured LDAP for Splunk to allow Active Directory users to the application while setting appropriate permissions for each container.
  • Utilized active directory to provision/map share drives, filesfolders, & grant access to network resources, etc.
  • Utilized Active Directory, UNIX, MVS RACF Mainframe, Teradata, Mobius, Service Center, etc.

Show More

Job type you want
Full Time
Part Time
Internship
Temporary

6. Customer Service

high Demand
Here's how Customer Service is used in Security Administrator jobs:
  • Led various migration and integration of new security devices into the existing network which dramatically improved operational efficiency and customer service.
  • Provided user support and customer service on proprietary computer applications and platforms, specifically to ensure network and program security.
  • Demonstrate excellent customer service skills and the ability to balance technical support with interpersonal rapport.
  • Provided extraordinary customer service for proper protocol for U.S. and foreign government officials.
  • Provide outstanding customer service/support, projecting professionalism and communication skills at all times.
  • Managed ticket system providing fast customer service.
  • Provided customer service to any customers with question or issues involving security measures on behalf of Dulles Airport.
  • Provided safety to the public while they travel.physical searches (body, personal items), customer service.
  • Cross trained in customer service to assist the call center when needed with member prescriptions and insurance.
  • Adhered to strict government guidelines for dealing with the public, always maintaining good customer service.
  • Perform as customer service, responds to employee questions, data entry using multiple applications.
  • Delivered both world-class security and customer service at St. Louis- Lambert International Airport.
  • Provide general customer service i.e, address changes, form and document requests.
  • Provide efficient, professional and courteous customer service for BCBS customers and employees.
  • Work closely with all employees in the areas of guest management/customer service.
  • Change Management / Customer Service / Interpersonal Skills.
  • Provided customer service to all guests including store locations, directions, and mall directory Provided general administrative services.
  • Designed and implementd improvements in communication, customer service, monitoring, or enforcement of standards.
  • Worked as customer service/Tech Support for Telecheck processing systems, and Clover integrated POS systems (2 years).
  • Received cross-training as baggage screener, and provided excellent customer service.

Show More

7. Security Policies

high Demand
Here's how Security Policies is used in Security Administrator jobs:
  • Improved corporate security policies and procedures, developed and maintained corporate security strategies for the computing platforms.
  • Configure and manage network and systems design to ensure implementation of appropriate security policies.
  • Developed and implemented security policies rolled out to the entire company.
  • Assured organizational personnel adhered to established security policies and practices.
  • Skilled in defining and assessing simple-to-advanced security policies.
  • Configured remote access and Security policies.
  • Developed security policies and procedures.
  • Updated and maintained security policies and procedures on a frequent basis to account for changes in PCI or NCUA compliance.
  • Advise personnel on all security policies and procedures and resolve issues related to security of classified information held.
  • Developed and published security policies, guidelines, and standards for all platforms.
  • Develop IT security policies, employee use policies, and supporting procedures.
  • Established and maintained security policies of the LAN based application systems.
  • Assist in the development and implementation of security policies and procedures.
  • Planned, developed, and implemented security policies across multiple platforms.
  • Create and configure F5 ASM security policies for multiple web applications.
  • Deploy and maintain security policies dictated by Corporate HQ.
  • Ensured compliance of IT Security Policies.
  • Selected Key Accomplishments Ensured that vulnerabilities are mitigated by restructuring active security policies and role assignments.
  • Update existing security policies and migrated users to new standards as company rollout Windows 2000 environment.
  • Helped work with the IT Security Staff to Document and create security policies.

Show More

8. Security Clearance

high Demand
Here's how Security Clearance is used in Security Administrator jobs:
  • Monitored and managed employee security clearance investigation processes using JPAS and Visit Invitation and Request Letters.
  • Updated personnel security clearance information utilizing JPAS and SIMS as required.
  • Distribute Security Clearance Notification to staffing personnel / hiring manager.
  • Processed/briefed approximately 150 new Employees for Government Sponsored Security Clearances.
  • Processed and reviewed security clearance packets for accuracy.
  • Maintained Master Security Clearance Database.
  • Possessed Top Secret/SSBI Security Clearance.
  • Initiated and submitted personnel security clearance applications using the Defense Security Service's Joint Personnel Adjudication System (JPAS).
  • Assist clients with security clearance paperwork, finger print employees, enter information into database system, file paperwork.
  • Process fingerprints, forwards to FBI for security clearance, and maintains security clearances on all personnel.
  • Work on completing employee's paperwork for new and 5 year updates for security clearances.
  • Assisted KEI employees in completing security clearance forms, fingerprint cards and 562.
  • Called to check on security clearances before setting access for clients and employees.
  • Process individuals and employees for security clearances and necessary badge issuance.
  • Completed Visit Request for personnel Assisted the facility security officer in the tracking of personnel security clearances in JPAS.
  • issue ID badges and passwords, security clearances to new employees, interns, vendors, and contractors.
  • Processed and maintained personnel security clearances for 1200+ employee s companywide.
  • Tracked all functions for E-Qip methodology for employee security clearances.
  • Check personnel security clearances Escort personnel through restricted area Conform with military security measures
  • Process security clearances Experience with CWAN Performed COMSEC Manager duties Managed personnel folders and database Highly experienced using JPAS Performed Fingerprinting

Show More

9. Access Control

high Demand
Here's how Access Control is used in Security Administrator jobs:
  • Fulfilled the role of security administrator for proprietary guard/cross domain solution equipment to fulfill information access control filtering of confidential information.
  • Develop and document procedural documentation to support access control methodologies in support of the services and applications.
  • Execute security access control, x-ray interpretation, vehicle search, electronic system administration and policy procedures.
  • Lead and manage physical access control and security protocols in accordance with company policy.
  • Assisted in establishing and implementing facility access control procedures and protection measures.
  • Provided authentication and access controls to remote users and business partners.
  • Access control in restricted areas, for example, entry and exit gates, vehicle searches, and other secure areas.
  • Monitored badge activity, access control system and various alarms and video surveillance systems on the CCTV & Network Client.
  • Differentiate between what the needs are and what the Dow requirements are for a position given Access Control Strategies.
  • Assist in maintaining the access control rules for supported applications in accordance with client's policies and procedures.
  • Perform access control; verify identities and clearance of individuals seeking PIV cards and access to CDC facilities.
  • Manage issuance of all access control cards ensuring retrieval of cards for those no longer requiring access.
  • Granted classified and unclassified access control for personnel into the Commander of Pacific Fleet, Military Command.
  • Provide management of access controls and oversight of security and audit policies.
  • Created, modified and deleted user profiles and other access controls.
  • Provide access control support for various buildings and offices.
  • Design and operate access control systems via Pro-Watch.
  • Managed RFP, vendor selection, design and installation of access control and video surveillance for [ ] new construction expansion.
  • Maintained badging and access control through S2 Enterprise.
  • access control for over 300 people scheduling security personnel for various assignments authorized all employees time sheets for payroll

Show More

10. Transportation Security

high Demand
Here's how Transportation Security is used in Security Administrator jobs:
  • Maintain an open line of communication between Supervisors and Transportation security officers.
  • Contract Support Staff Assigned to work with the Transportation Security Admin in Albuquerque, New Mexico.
  • Developed preliminary incident information for LEOs and superiors, and prepared various types of reports and documents related to transportation security.
  • Point of Contact for Emergency Management and Emergency Management related training at San Francisco International for the Transportation Security Administration.
  • Provided project logistical supply change solutions support and coordination for the Transportation Security Administration and training for Mobile Screeners.
  • Green State Airport Warwick, RI 02886 Transportation Security Screener
  • Lead Transportation Security Officer (Screener)
  • Served as advisor on security measures with the Transportation Security Administrations Federal Security Director and his staff.

Show More

11. Mainframe

high Demand
Here's how Mainframe is used in Security Administrator jobs:
  • Granted end users proper levels of security permissions to view/edit/delete sensitive mainframe data in accordance to job functions.
  • Assisted with the cross-training of my peers in all aspects of account-specific mainframe and network administration & troubleshooting skills.
  • Administered all Moves/Adds/Changes for 1000+ end users including network, mainframe, and e-mail access supporting various accounts.
  • Processed all security related request for End User, Directory, RAS, VPN, and Mainframe infrastructure.
  • Audited and updated access for 3,000 users in Headquarters and Operating Units for mainframe and remote access capabilities.
  • Worked as an IS Security Administrator for over 12,500 Windows users 8,500 IBM Mainframe users.
  • Audited network and mainframe accounts annually to regulate the proper level of systems access.
  • Implemented and enforced corporate security policies as a member of the mainframe security team.
  • Administered applications on the mainframe; providing access to over 200,000 accounts.
  • Migrated over 8,000 employees from mainframe human resources to SAP HCM 6.0.
  • Move, check and purge print jobs using JES2 Mainframe commands.
  • Served as an expert of the mainframe environment for prudential data.
  • Provision the CG network platforms (Windows & Mainframe).
  • Led and mentored five Mainframe and J2EE developers.
  • Distributed access to windows and mainframe systems.
  • Added and modified Mainframe/LAN/Midrange/Unix Applications to databases.
  • Conduct Boot camps to introduce UNIX to Mainframe centric personnel.
  • Created and deleted userid's in the mainframe.
  • Connected userid's to groups within the mainframe.
  • Update tso on-call using Netview in mainframe.

Show More

12. User Accounts

high Demand
Here's how User Accounts is used in Security Administrator jobs:
  • Perform weekly deletions on terminated user accounts using DCR
  • Assist with planning and execution of domain integration, user accounts, and email migration during corporate acquisitions and mergers.
  • Create, administer, and maintain all DMA user accounts in accordance with DMA and DTSS guidelines.
  • Maintained and managed user accounts, access and security permissions for the domain through Active Directory.
  • Managed local applications, which included the creation, amendment and deletion of all user accounts.
  • Worked closely with internal clients, vendors & other IT departments to provision end user accounts.
  • Review user accounts and system access to ensure regulatory and corporate compliance with policies and standards.
  • Maintained CISCO, DNS hosts tables and user accounts for Windows NT Domains and UNIX.
  • Administered 2,500 user accounts throughout the State of Texas and assigned security permissions.
  • Manage settings, user accounts, and subscription for the customer organization.
  • Established external VPN user accounts with Cisco Secure ACS 5.3.
  • Managed user accounts with the active directory console.
  • Establish M3 user accounts and provide training.
  • Managed User Accounts with Microsoft Active Directory.
  • Performed management & maintenance of user accounts, profiles and access privileges via HR policiescontrols, including ticket documentation.
  • Worked on Virtualization project (migrating user accounts from physical to virtual servers, script testing).
  • Create user accounts for computers, email, & applications Set securities for folders and access accordingly.
  • Administered and maintained SAP enduser accounts, permissions, and access rights.
  • Created & administered AS400/iSeries user accounts via iSeries manager & BSafe enterprise security manager.
  • Frequent administrational use of Novell Netware, Windows Active Directory and Checkpoint VPN user accounts.

Show More

13. Unix

high Demand
Here's how Unix is used in Security Administrator jobs:
  • Used UNIX commands to create, modify and remove accounts from client servers insuring access is granted to authorized users.
  • Supported NT MES network of 150 NT Workstations, 3 NT servers and 1 UNIX machine running Oracle database.
  • Worked with UNIX security, Architecture and Applications Development teams on a regular basis providing web administration support.
  • Create quarterly reports for NT and Unix production servers as well as issue security application quarterly reviews.
  • Worked changes to install patches and documented installation, passing all audits UNIX was involved in.
  • Handle incident ticket regarding UNIX; password reset, unlock user accounts and Process ID.
  • Worked on installation, configuration and maintenance of Sun Identity Manager 7.0/8.0 under Unix.
  • Trained New York, Pittsburgh and India Associates on all UNIX on boarding procedures.
  • Functioned as System Administrator for over 30 Windows NT/2000 and ERP UNIX Servers.
  • Manage UNIX user authentication and authorization for thousands of physical and virtual servers.
  • Grant access Key Financial servers, UNIX, Windows Servers.
  • Managed domain security for Windows 2000/NT and Unix servers.
  • Worked daily with UNIX System Administration Group.
  • Maintained duties as Unix Systems Administrator.
  • Administered a Unix-based (Bedside) Patient Care System providing Doctors and healthcare professionals throughout the company with access and support.
  • Performed the installation configuration and administration process of the Firewall (Checkpoint Firewall-1 over a UNIX Sun Solaris 2.6).
  • Created multiple UNIX scripts to automate application and web servers and process schedulers Prior Position: Business Analyst Storage U.S.A.
  • Evaluated and implemented security on Unix, Intel, IAM, Application Hosting, and Commercial Web Middleware infrastructure.
  • Managed the process of authorizing and creating UNIX Id's, groups and permissions.
  • Investigated all UNIX access issues as well as reviewed all Intellitactics alerts sent to our Netcool Monitor.

Show More

14. Information Security

high Demand
Here's how Information Security is used in Security Administrator jobs:
  • Prepared disaster recovery plan and monitored compliance with information security policies and procedures in the various units of the organization.
  • Evaluated, implemented and customized information security software for host-based and network-based assessment, intrusion detection, monitoring and reporting.
  • Mitigate risk by assisting Line of business developing plans to reduce security risk and stay within Information Security Policy.
  • Designed and conducted training sessions for the Customer Support Department and the internal Information Security Department.
  • Maintained 100 percent accountability of Personal Identification Information Security System which kept our department operational ready.
  • Developed and maintained an Automated Information Security policy and procedures manual for the corporate office.
  • Review information security logs for violations and take appropriate action within established guidelines.
  • Coordinated information security efforts with auditors, regulators, and customer auditors.
  • Advised and assisted in projects initiated within the Information Security department.
  • Dedicated information security administrator responsible for the day to day security.
  • Produced and maintained operational documentation for the Information Security department.
  • Administer corporate information security infrastructure systems and related technologies.
  • Provided periodic reporting on information security issues.
  • Provide support in developing, implementing, and maintaining detailed corporate information security policies, principles, standards and procedures.
  • Manage and communicate Information Security Policies, Standards, and Controls and ensure personnel are complying.
  • Provided daily status reports on the networks state of information security health.
  • Provided direct support to the head of Information Security.
  • Provided Risk Management and mitigation recommendations for projects Performed annual information security self-assessment for presentation to the Executives.
  • Provided Quarterly metrics to the Global Privacy and Information Security Steering Committee as a Vontu Compliance Member/Manager.
  • Batch Production Unit - Expeditor, Twilight Shift Marketing Analyst/Information Security Coordinator Executive Assistant/Information Security Coordinator Executive Secretary

Show More

15. VPN

average Demand
Here's how VPN is used in Security Administrator jobs:
  • Managed VPN/Remote both internally and externally.
  • Provided support for remote and home user by trouble shooting Cisco VPN router connectivity along with other remote authentication issues.
  • Provided support on Entrust PKI infrastructure system for BLS secure remote VPN two factor client authentications per government standard.
  • Assisted and supported client's VPN Outlook Web Access project which allowed users to access their work files remotely.
  • Manage and maintain the security of remote access ACS+, Virtual Private Network (VPN).
  • Designed secure DNS infrastructure for 5 globally interconnected SOC sites utilizing DNS Sec over VPN.
  • Established Site to Site and Client to Site VPN with new and existing customers.
  • Managed VPN settings with two phase authentication for vendors and associates.
  • Administered RADIUS authentication servers for 1000's of VPN users.
  • Implemented a secure VPN connection for remote terminal offices.
  • Upgraded the VPN solution for Canadian and U.S. offices.
  • Involved in resolving users VPN access issues.
  • Assist with remote VPN connection.
  • Processed VPN Secured ID Tokens.
  • Create VPN and SAP accounts.
  • Contribute to engagement planning and ensuring product/deliverables meet contract/work plan and projects such as JVPN and XenCitrix transitions.
  • Assign RSA token to the users, investigate RSA token related issues and help users login to VPN.
  • Negotiate VPN tunnels using IPsec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
  • Deployed Site to Site VPNs utilizing Checkpoint Firewall.
  • Administered Active Directory and Softtera LDAP VPN accounts.

Show More

16. Jpas

average Demand
Here's how Jpas is used in Security Administrator jobs:
  • Resolved all security clearance issues between the customer and JPAS, decreasing adjudication wait time and eliminating additional stress on customer.
  • Completed approximately 1,000 JPAS/CDB/hard file cross reference checks to determine total comprehensive DARPA SCI Indoctrinated personnel.
  • Terminated employees in EPSQ, JPAS and Access Commander; followed by sending term/debriefing letters.
  • Use JPAS, e-QIP and other security software in the performance of assigned duties.
  • Managed newcomer and security-related databases and files; maintained an active JPAS account.
  • Placed calls to DSS and used JPAS to get updates on security clearances.
  • Monitored and tracked personnel security clearances and access in JPAS and SIMS.
  • Verify clearance status in JPAS while capturing clearances for new hire candidates.
  • Conducted Exit Interviews on personnel as well as Debriefs/Removals/Separations in JPAS.
  • Initiated, tracked and updated clearances and records in JPAS.
  • Updated folders to include JPAS report of current clearances.
  • Access, review and submit clearance/access information using JPAS.
  • Utilized JPAS for employee and visitor clearance information.
  • Maintained records and processed status checks through JPAS.
  • Use JPAS System for various security related issues.
  • Process visit requests utilizing SIMS and JPAS.
  • Maintained required security databases (JPAS/SIMS).
  • Gained a working knowledge of JPAS, E-QIP and SMS.
  • Create and process country clearance request through US Government Foreign Travel System Process Visitor Request and SARS through JPAS/JCAVS System.
  • Submit visit request via JPAS/ACAVS/Hardcopy.

Show More

17. Social Security

average Demand
Here's how Social Security is used in Security Administrator jobs:
  • Filed, forward and validated beneficiary request for information, processed information to obtain a Social Security Card.
  • Communicated with various Social Security offices in an effort to maintain the Continuing Disability Review medical files.
  • Determined initial and post eligibility for Supplemental Security Income (SSI) and Social Security Disability Claims
  • Collect social security taxes from state political subdivisions and remit to Social Security Administration.
  • Acted as a liaison between the Social Security Administration and community organizations.
  • Approve or disallow people for Social Security disability benefits.
  • Processed incoming checks to the Social Security Administration.
  • Provided consolation to Social Security Administration Office.
  • Updated and corrected Social Security Beneficiaries records.
  • Executed new and replacement social security cards.
  • Implemented strong customer service skills working with the public to issue U.S. citizens new and replacement social security cards.
  • Project 4: Consent Based Social Security Number Verification (CBSV) is a web-based application.
  • Reviewed files and records for income, date of birth, and social security verification.
  • Document and maintained claimant s records according to Social Security Administration laws and policies.
  • Assist the public completing applications for new or replacement social security cards.
  • Created framework for roll out of President's Social Security reform initiative.
  • Worked with process of request for social security cards.
  • Service Representative Process applications for new or replacement social security cards for US and foreign-born applicants.
  • Designed and support Social Security Processes .
  • Assist Clients with replacement Social Security Cards .

Show More

18. Setup

average Demand
Here's how Setup is used in Security Administrator jobs:
  • Network duties: Setup user profiles/ accounts and reset user passwords for PAL/UUNET, and Internet access.
  • Rolled out Reports & Query to the end users in a phased manner with different Security setup.
  • Exchange administration on multiple exchange servers, including setup for multiple types of mailboxes, i.e.
  • Assisted with installations and setup customer software on laptops, desktops, and hand-held Blackberry devices.
  • Analyze security setup and redesign as appropriate in order to prevent risk to the firm.
  • Configured Profile Generator and transported settings to all clients, setup security for the developers.
  • Install and troubleshoot Clover POS systems, and build and setup inventory and menus.
  • Audit user security setup and access, as well as system account level access.
  • Lead for the project and responsible for development, conversion and security setup.
  • Provide user account setup and configuration to allow users access to the services.
  • Implemented security changes and new security setups for over 400 employees.
  • Assisted users with AVAYA PBX IP Telephone configuration and setup.
  • Implemented windows based domains and setup trusts between existing domains.
  • Analyze daily requests to ensure proper account setup.
  • Created Share folders and setup permissions.
  • Created system/application/user security profiles and new user accounts setups for mainframe, midrange and application environments.
  • Streamline process for on-coming projects with regards to setup, scripts, standards, reviews etc.
  • Conducted general EHR orientation for all new users Responsible for issuing RSA tokens and VPN setup.
  • Helped setup processes via Autosys for alert notification via pager, event dependencies between processes.
  • Pay: $18 hour Replaced and setup 3 Lexmark Network printers.

Show More

19. Troubleshoot

average Demand
Here's how Troubleshoot is used in Security Administrator jobs:
  • Diagnosed and troubleshooted UNIX and Windows processing problems and applied solutions to increase company efficiency.
  • Documented all processes and troubleshooting procedures for business continuity and administrator training.
  • Performed diagnostics and troubleshooting of system issues, documented help desk tickets/resolutions
  • Experienced in SiteMinder policy server logs for troubleshooting SiteMinder environment.
  • Handled troubleshooting when computers or system malfunctions.
  • Thrived in difficult troubleshooting situations.
  • Utilized Resource Analyzer and Log Analyzer for performance testing and troubleshooting and Knowledge on managing LDAP Policy Store.
  • Support Windows 2003 Server Active Directory administration, troubleshooting, GPO, account creation/deletion,.
  • Performed Administration, software installation, upgrades/patches, troubleshooting, and maintenance on UNIX/LINUX servers.
  • Completed troubleshooting of hardware problems for PCs, scanners, printers, faxes & copiers.
  • Planned and implemented after-hours updates, troubleshooting, and installations on production servers.
  • Monitor and resolve system glitches, troubleshoot when access/egress portals go offline.
  • Review Integration Broker feeds and troubleshoot any errors that occur.
  • Helped support and troubleshoot all end user security requests.
  • Administer, maintain and troubleshoot.
  • Help manage Sophos anti-virus integrated with active directory and monitor for compliance, network troubleshooting of infrastructure.
  • Handled all security related customer calls and provided troubleshooting assistance in a timely manner.
  • Assisted in AD Migration Project, setting up GPOs for multiple hospitals within MedStar, and troubleshooting.
  • Assist help desk support, troubleshoot user problems in a timely manner.
  • Blackberry support including activations, deactivations, mail flow troubleshooting via BES Server.

Show More

20. SOX

average Demand
Here's how SOX is used in Security Administrator jobs:
  • Facilitated internal security audits to assess SOX compliance.
  • Provide guidance and knowledge in SOX ITCG and PCI standards to underline the need for proper controls to minimize risk.
  • Performed quarterly and annual reviews of SOX and GLBA in-scope systems and applications and provided documentation for all exceptions.
  • Perform standard SOX ITCG access review on a quarterly basis with a focus on Role Based Access.
  • Act as primary contact for Internal/External SOX ITGC auditors with hands on coordination with all departments involved.
  • Resolved all SOX and Audit issues in CRM and R/3 system including creation of mitigation controls.
  • Monitor and ensure corp. SOX compliance as it relates to established baseline in a SAP environment.
  • Perform quarterly requested department audit SOX reports, and access history reports to SWA managers.
  • Introduced new processes to improve dramatically issues related to User Life Cycle within SOX compliance.
  • Worked with compliance group - developed SOX Compliance documentation and create control matrix.
  • Create processes for permissions, access related to SOX and SAS70 compliance.
  • Manage life cycle for AD accounts for SOX compliance and security controls.
  • Have to follow strict procedure, in compliance with Sarbanes-Oxley SOX.
  • Create corporate policy for various processes for SOX compliance purposes.
  • Maintain conformity to regulatory standards (SOX, FERC/NERC).
  • Led internal audits to advance PCI and SOX compliance.
  • Deploy and manage systems security based on Corporate/Sarbanes-Oxley/SOX security policies and compliances.
  • Participate in SOX Auditing and testing of Oracle PeopleSoft Security Creating and run Queries for data analysis and troubleshooting.
  • Perform pre-audit checks in Production systems to ensure the client is SOX and REACH compliant.
  • Performed quarterly SOX 404 Compliance assessments using Axentis software.

Show More

21. Security Personnel

average Demand
Here's how Security Personnel is used in Security Administrator jobs:
  • Facilitated the coordination of Montgomery County Community College classes and CPR classes for security personnel.
  • Maintained the storage of employee confidential records and notifications of personnel actions with security personnel.
  • Conducted interviews to recruit new valet and security personnel.
  • Provided training to new valet attendants and security personnel.
  • Trained security personnel on counter surveillance techniques that resulted in zero bank robberies for E*TRADE Bank for over 13 years.
  • Create scheduling for training, work, leave and time management for all Security personnel.
  • Schedule preparation, computers, oversight and support functions for security personnel.
  • Implemented software training on all the above systems for security personnel.
  • Maintained office security personnel by orienting, and training employees.
  • Access database of all security personnel kept up to date.
  • Trained new security personnel on the access control badging system and fingerprinting procedures.
  • Fingerprinted candidates Maintained security personnel records Served as backup for receptionist

Show More

22. Security Access

average Demand
Here's how Security Access is used in Security Administrator jobs:
  • Obtained justification for, prepared and submitted personnel security access requests to the appropriate customer.
  • Documented and coordinated interdepartmental security access setup for business user assignments and for developing projects.
  • Provided support to technical coordinators for new user setup and security access levels.
  • Processed daily security access requests across the various security systems platforms.
  • Provide initial analysis of security access issue.
  • Utilized Remedy Change Management protocol and software for tracking of projects, turnover, data changes and security access.
  • Work with department representatives to identify the proper security access required for the various positions within the department.
  • Initiated the use of secure key boxes for dormitory rooms, facilitating security access during emergencies.
  • Work with application leads to configure and maintain Query and Tree security access definitions as directed.
  • Process security access requests based on job functions that are generated from Identity Management Suite.
  • Complete requests for RSA security access, complete incident tickets regarding RSA tokens and access.
  • Configured security access to all network devices, servers, shares and websites.
  • Set up new user's security access and update existing user's access.
  • Partnered with HR to create new job codes associated with security access profiles.
  • Call center environment; first level of support for security access related questions.
  • Assigned all security access as requested, authorizing compliance with SOX regulations.
  • Provide security access to multiple platforms for 30,000 PwC employees and contractors.
  • Assisted the physical security team with processing security access card requests.
  • Administered security access for 3 divisions of the company.
  • Obtained highest security access and clearance for all levels of Government Contractors

Show More

23. SQL

average Demand
Here's how SQL is used in Security Administrator jobs:
  • Experience with PeopleSoft HR 8.30 Query creation (using PeopleSoft Query and SQL Query Analyzer) and support.
  • Monitored, queried using SQL and reconciled data transfers used to assemble reports used for regulatory compliance.
  • Support Microsoft SQL 2000 server clusters and databases, planning for future increases in capacity.
  • Created Alerts such that SQL server responds to various error conditions like backup failures.
  • Support Servers, Workstations, SQL Servers, including user remote network connectivity process.
  • Used SQL to retrieve data from the database to generate reports as required.
  • Experienced in identifying and Analysis of SQL performance during Oracle Database Upgrade.
  • Involved in migrating the Year End system from SQL server to Oracle.
  • Evaluated web sites for XSS, SQL injection and other vulnerabilities.
  • Used SqlDataAdapters & Datasets extensively for database activity.
  • Provided Support to developers for DB2, Weblogic, WebSphyere, MQ, MySQL, SAP, PeopleSoft.
  • use visual basic and SQL to build scripts to allow convenient searches of multiple databases.
  • Monitor network alerts, baseline databases (DBs), and SQL file integrity.
  • Administered and Maintained operations of NT/Unix/Novell, File/SQL/Exchange/Web Servers and IBM AS/400 Mainframe.
  • Developed the Purchasing module using VB.NET, ADO.NET, SQLHelper Class.
  • Developed Employee (checkout-Check-in) Module using ADO.NET, SQLHelper.
  • Developed Inventory management module using ADO.NET, SQLHelper.
  • Developed Inter-Store Transfer module using ADO.NET, SQLHelper.
  • Defined and established rules for SQL server..
  • Involved in development of SQLDataHelper DB class using SQLHelper.

Show More

24. User Access

average Demand
Here's how User Access is used in Security Administrator jobs:
  • Maintain the standard operating procedures and security plans for assigning user access to supported critical applications.
  • Reset passwords and provided user access to Coco-Cola business units.
  • Provide guidance and consultation for user access security related questions from users, developers, and managers, and facility security.
  • Project coordinator for new team processes including project meetings, documentation, user access testing, and team documentation and training.
  • Exceeded expectations when acting as a Security site admin creating user access for new and current employees on and off site.
  • Analyzed all aspects of User Access for the deployment for all new applications which the organization implements.
  • Analyzed user access needs, developed access roles, and add/change/delete user access to the HRMS application.
  • Processed all system/application access requests & user access issues within company established SLA's and policies.
  • Administer secure user access to 40+ applications while operating within SOX/HIPPA compliant guidelines with role managers.
  • Manage routine monthly, quarterly, and annual user access audits for SOX compliance.
  • Analyzed and supported all new projects related to user access for Security Administration Team.
  • Stay abreast of industry system modifications and changes that effect user access permissions.
  • Control all user access to network, exchange, and in house software.
  • Set up Active Directory and granted user access and admission rights.
  • Maintained user access to a wide variety of systems and applications.
  • Supported and provisioned user access requests for all CHRISTUS Health facilities.
  • Identify security problems with user access to SAP R/3, BW, XI, SRM etc.
  • Partnered with Information Technology teams to discover root cause of user access issues via Service Manager tickets and hotline calls.
  • Reviewed and refined user access policies and procedures to ensure data and code security, utilizing [ ] best practices.
  • Updatedmaintained company knowledge base regarding user access requestsissuesesolutions.

Show More

25. DOD

average Demand
Here's how DOD is used in Security Administrator jobs:
  • Administered routine aspects of the DoD industrial security program to ensure compliance with government and company security policies and procedures.
  • Provided senior-level administrative support to senior staff on DoD classified programs.
  • Provided administrative services/support on company, DOD and commercial contracts.
  • Advised Senior Executives and DoD management officials and their staff on issues relating to government travel policies, procedures and compliance.
  • Create and maintain issued and received Department of Defense (DoD) Form 254s on all classified contracts.
  • Maintain and manage 1700+ employee personnel clearances via DoD guidelines and regulations as the JPAS Account Manager.
  • Investigate and report adverse information concerning employees holding DoD clearances as required by DSS and contractual requirements.
  • Prepare and submit visit authorizations letters for employees for IC and manage DoD visits through JPAS.
  • Possess a thorough knowledge of Department of Defense (DoD) and Private Industry security regulations.
  • Assist the ISSM in Information Systems Security Officer duties for multiple DoD and IC programs.
  • Provide services for both DARPA and all DoD Agencies; Customer Service, i.e.
  • Conduct initial and annual security briefings on behalf of the DoD and the IC.
  • Create security policy to comply with DoD Directives, set up physical/logical access control.
  • Provide program security management to DOD SAP, SAR, and SCI programs.
  • Provide Top Secret control management in compliance with DoD NISPOM Overprint.
  • Processed SCI visit requests for multiple DOD/Intelligence Community clients.
  • Follow all DoD and DSS security requirements.
  • Processed initial security clearances for DOD.
  • Review DOD and Intelligence Community databases for security clearance verifications.
  • Assist the FSO in the successful implementation of the NISP for a multi-program DoD and IC facility.

Show More

26. TSA

average Demand
Here's how TSA is used in Security Administrator jobs:
  • Briefed senior management on TSA international security and counter-terrorism issues with emphasis on the maritime environment.
  • Disseminated and explained TSA security inputs to airport stakeholders for compliance.
  • Worked with internal and external stakeholders to build relationships that fostered mutually beneficial outcomes while supporting TSA's mission and goals.
  • Maintain a flexible attitude in working in different locations and performing various job duties in support to the TSA mission.
  • Served as a vital interface between TSA attorneys, employees of DHS, the public, and others.
  • Served as the Human Resource liaison to resolve TSA employee issues; for all TSA screening staff.
  • Certified as a TSA fact finder for harassment cases by The TSA Office of Civil Rights.
  • Determined when enforcement actions were needed and provided this information to TSA counsel for action.
  • Trained Initial Screening Crews Across the Country for Start Up of TSA Operation Post 9/11.
  • Conduct Aviation Screening Assessment Program Testing (ASAP) in accordance with TSA HQ mandates.
  • Participated in process improvement, quality assurance, policy and procedure development for the TSA.
  • Guarded exit lanes to ensure there was no one that by-passed TSA security personnel.
  • Facilitated training on all TSA procedures and performed timely follow up to monitor adherence.
  • Introduced and implemented the Model Workplace Program which enabled compliance with TSA directives.
  • Started a TSA-required 24-hour coordination center to monitor intelligence and employee staffing.
  • Developed and generated confidential daily reports and forecasts for the TSA.
  • Generate and maintain security reports for review by TSA Headquarters.
  • Train new recruits coming into TSA.
  • Communicate TSA guidelines to passengers.
  • Help Maintain current TSA PMIS system using HTML, CSS, ASP with SQL Server back-end.

Show More

27. Lotus Notes

average Demand
Here's how Lotus Notes is used in Security Administrator jobs:
  • Perform validation/correction of data in Lotus Notes databases.
  • Create user accounts on multiple environments, like Active Directory, mainframe, Lotus Notes and VMS.
  • Provided Level III Help Desk as it relates to Lotus Notes email servers and user mailbox systems.
  • Created and implemented training materials and taught new users how to effectively use the Lotus Notes tool.
  • Support a robust Microsoft based network running XP, Windows 7, and Lotus Notes.
  • Administered all aspects of electronic mail initial setup and restoration (Lotus Notes).
  • Played different roles as Active Directory admin, Lotus Notes admin and Software Administration.
  • Attended In-House training on Lotus Notes R5 Administration and Windows NT user administration.
  • Upgraded and maintained Lotus Notes domino server, DHCP, and WSUS servers.
  • Regulated and maintained Lotus Notes national and international address books and group access.
  • Administered Lotus Notes Servers to implement Security throughout the Domino Name Network.
  • Provided tier one support for Lotus notes email system for internal users.
  • Processed LAN ID and Lotus Notes transfers and domain move request.
  • Assisted 4000+ requests/calls per month from helpline or via Lotus Notes.
  • Managed Lotus Notes server and installation of all end users.
  • Created mailboxes for new employees within the Lotus Notes program.
  • Skilled with using Lotus Notes.
  • Created/managed user groups and databases within Lotus Notes, assigned emergency access userids.
  • Administered Novell, Lotus Notes and Windows Active Directory security
  • Supported [ ] users on Windows, Novell, NT, Lotus Notes and RACF mainframe platforms.

Show More

28. Security Issues

average Demand
Here's how Security Issues is used in Security Administrator jobs:
  • Provided guidance and assistance to internal clients on security issues, especially those relating to processing of classified information.
  • Briefed daily fellow officers on security Intel related to happenings around the world dealing with security issues/violations.
  • Attend meetings and communicate with system managers regularly concerning security issues and recommend security controls as needed.
  • Provided first level user support for access/security issues by analyzing requests and problems.
  • Performed troubleshooting to resolve access and security issues.
  • Escalated and reported security issues to management.
  • Researched and resolved security issues.
  • Provided feedback to IT staff and the business partners about security policies and consults on security issues regarding user id reconciliations.
  • Inform users of security issues and ensure company security principles are being followed and system and data integrity preserved.
  • Serve as interface on security issues with TVA organizations and with the NRC during site security inspections.
  • Assist network engineers in deployment of IDS/IPS systems and coordinate efforts to resolve network security issues.
  • Identify information system security issues and problems through the use of studies, analysis and research.
  • Evaluated and resolved multiple technical security issues via ticket and phone support.
  • Help address security issues that are impacting the entire Tenet Health System.
  • Provided continual written reports to management concerning security issues in the SRS.
  • Conduct briefing with flight crews on security issues.
  • Work with auditors to correct any security issues.
  • Analyze projects for possible security issues and compliance.
  • Work with IT staff to correct security issues discovered during nCircle vulnerability scans.
  • Manage local security issues such as malware removal, website whitelisting/blacklisting, and spam/phishing control.

Show More

29. Phone Calls

average Demand
Here's how Phone Calls is used in Security Administrator jobs:
  • Answered incoming phone calls with courtesy and professionalism while providing accurate information to inquiries.
  • Directed incoming telephone calls and performed other administrative duties and directed by the company
  • Stream incoming telephone calls to predetermined extensions.
  • Answer telephone calls to take messages, answer questions, and provide information during non-business hours or when switchboard is closed.
  • Anticipated and prepared materials needed by the supervisor for conferences, correspondences, appointments, meetings, telephone calls, etc.
  • Monitored and took phone calls for messages, provided solutions, and supplied information during and after business hours.
  • Serve as the receptionist; answer, screen and forward incoming phone calls and provide information as needed.
  • Received incoming telephone calls, provided answers to routine inquiries and/or referred them to other personnel.
  • Process and code badges in all systems, answer phone calls, respond to emails.
  • Handled high volume of phone calls pertaining to inquiries, issues, and/or questions.
  • Answer phone calls and direct calls to appropriate parties or take messages.
  • Frequent phone calls, composing access forms and scheduling tenants and contractors.
  • Make phone calls, e-mails and inquiries on assorted database information.
  • Answered and directed incoming phone calls, keyed 11,000 stokes.
  • Screened telephone calls and inquiries and directed them as appropriate.
  • Answered, screened and directed inbound phone calls.
  • Answered telephone calls and took incoming messages.
  • Answer inbound telephone calls and page employees.
  • Answer phone calls regarding maintenance, security, fdny issues and forward them to appropriate staff members.
  • Reason for Leaving: Seasonal Duties: Filied papers, Validation, Answered phone calls

Show More

30. Internet

low Demand
Here's how Internet is used in Security Administrator jobs:
  • Participated in evaluation of future technology planning involving email server, content filter, Internet applications and finance systems.
  • Supported day-to-day administration system of network firewalls, messaging security gateways, and internet security proxies, windows servers.
  • Develop a CERT for coordination of security activities for 10 independent colleges sharing Internet infrastructure.
  • Installed new servers/new applications on existing servers in support of internet and intranet environment.
  • Advised customers on internet security and assisted them in formalizing their security policies.
  • Developed security awareness training that provides education about proper internet and security systems.
  • Reviewed and monitored Internet usage for compliance violations.
  • Designed and implemented the troubleshooting and contingency plan for the Internet Banking (Network and Applications Security).
  • Installed and supported OVD as a front end LDAP proxy server using Oracle Internet Directory (OID).
  • Process IDs, passwords and group requests, Internet address and Global User ID administration within Lotus Notes.
  • Assign IP addresses and setup computers with the correct proxy Internet, Intranet and DNS settings.
  • Respond to internet questions and request, refer clients to the appropriate party for assistance.
  • Diagnose and resolve end-user network access, e-mail and Internet issues.
  • Granted access to approved users for two in-house databases and Internet.
  • Manage Internet and Web Services technical projects.
  • Created, deleted or updated Internet addresses.
  • Managed the wireless Cisco/Aruba network that allowed secured access to the internet.
  • Coordinated the Internet 50 project with Medco Data Finance department.
  • Implemented and Maintained Secure Internet Online Banking Web Site.
  • Fabricate badges; provide data inputting (requiring badging, web site and internet badging skills.)

Show More

31. SCI

low Demand
Here's how SCI is used in Security Administrator jobs:
  • Cooperated laterally with other departments and assumed an interdisciplinary role in Personnel Management, Automation, Logistic, and Administrative disciplines.
  • Prepare and provide SCI visit certification policy and procedure training to the various administrative support staff forums at the laboratory
  • Initiated Security/Safety Briefings and conducted Security Surveys for approximately 125 Employees and three SCIFS.
  • Conduct performance evaluations, develop performance improvement plans, and handle disciplinary actions.
  • Prepare and process disciplinary actions of all security officers.
  • Maintained Several SCIFS for Multiple Programs, Administered Briefings and Debriefings to all Military and Civilian personnel involved in said programs.
  • Evaluate several USCIS documents such as I-94, I-551, I-76, for validity, visually and via the SAVE system.
  • Support the Program Security Representatives (PSR) and Government Special Security Officer (SSO) for daily SCIF activities.
  • Established physical requirements and procedures for the expansion of the MASE SCIF in accordance with DCID 1/21.
  • Re-accredited the MASE SCIF, in accordance with DCID 1/21, once the facility was completed.
  • Passed SCI clearances/verify SCI access and maintain the Visitor Control Database for the Annapolis Junction Facility.
  • Manage 40 plus officers of diverse backgrounds; manage officers' performance, attendance and discipline.
  • Implemented discipline procedures based on the level of student s repeated offenses and/or behaviors.
  • Maintained personnel records regarding clearance levels as required for entry to the SCIF.
  • Forwarded SCI and SAP clearances to government and contractor partners.
  • Work Closely with Field Counsel on disciplinary/conduct issues.
  • Acquired a TOP SECRET/Q/SCI Security Clearance.
  • Review, analyze and scrutinize prescreens questionnaires to determine eligibility on crossover cases and initiate SCI nominations.
  • Apply self-aid buddy care, life saving procedures, including cardiopulmonary resuscitation, as first responder to accident and disaster scenes.
  • Maintain Sensitive Compartmented Information Facility (SCIF) access lists and escorts all SCIF visitors.

Show More

32. Peoplesoft

low Demand
Here's how Peoplesoft is used in Security Administrator jobs:
  • Migrated security objects between various instances in PeopleSoft 8.3 using standard utilities.
  • Maintain PeopleSoft security application access and Perform all production migrations.
  • Document and resolve PeopleSoft security related issues.
  • Developed and manage PeopleSoft Tree Security.
  • Obtained a PeopleSoft feed for the CART database, which was used to provision access to homegrown applications.
  • Developed SQL queries for determining user account status, activity, and rights in all PeopleSoft environments.
  • Modified PeopleSoft delivered portal structure by moving one content reference from one folder to another folder.
  • Accepted latter choice as an opportunity to expand knowledge of PeopleSoft from a technical standpoint.
  • Developed and maintain security profiles/groups at all levels within the PeopleSoft HRMS modules.
  • Served as a PeopleSoft Security Administrator in CRM 8.4/8.8/8.9 and Portal 8.4.
  • Input and update all financial data into the CMS and PeopleSoft systems.
  • Provided guidance to PeopleSoft Administrators and DBA with code migration.
  • Involved in setting up new users in the PeopleSoft Systems.
  • Create PeopleSoft ID's through the mainframe at the SPF menu.
  • Perform Security Audits and access reviews Configure/develop PeopleSoft Security objects.
  • Created and maintained complex, efficient stored procedures in Peoplesoft Db using PL/SQL.
  • Worked closely with HRS Peoplesoft Security Administrator to assist as needed.
  • Assist with data validation between Peoplesoft and Workday.
  • Maintain PeopleSoft Financials application software security Provide continuous support and trouble shooting for Oracle PeopleSoft Users and Management.
  • Reset NT, Novell, e-mail, PeopleSoft and mainframe passwords.

Show More

33. IDS

low Demand
Here's how IDS is used in Security Administrator jobs:
  • Make staffing recommendations, develop staff schedules, and periodically implement shift reorganizations and rebids to maximize productivity.
  • Suggested IDS solution to automate auditing of network vulnerabilities and intrusions.
  • Managed security for the corporate HQ including VPN, Firewalls, Content Filtering, Wireless and IDS devices.
  • Maintain network security through the review of centrally managed IDS, application, and event log data.
  • Collected SecuredIDs and Blackberry's of terminated workers and provided them to the proper department.
  • Analyze Cisco ASA firewall logs for malicious activity as alerted by HP Tipping Point IPS/IDS.
  • Created and maintained work instructions, job aids and training material for security processes.
  • Established the standards and created over 10,000 new LAN Ids and Lotus Notes accounts.
  • Provide F5ASM reports as support IDs are sent in to customer service.
  • Arrange for picture IDs of tenants & contractors in the plant.
  • Used Data grids for presenting information in tabular format.
  • Led the implementation of IDS solutions across the enterprise.
  • Reviewed security logs and violation reports (ids).
  • Update IDs and/or disable/delete as needed.
  • Assigned user Ids or usernames and passwords to authorized users in both (LID) and the web-based XML applications.
  • Resolved all users and password related issues by maintaining a help-desk for login ids, password and other security-related issues.
  • Managed IDS infrastructure and access control in support of NISP and DCID requirements and DSS guidance.
  • Managed and monitored Symantec IDS sensors, including responding to alerts from their SOC.
  • Monitored gateway end points (router and firewall, managed IDS/IPS.
  • Created account IDs and passwords for Novell 5 in conjunction with Windows Server 2008 Account Auth.

Show More

34. Linux

low Demand
Here's how Linux is used in Security Administrator jobs:
  • Performed vulnerability and networking scanning assessments on all Linux and Windows instance in AWS develop environment to minimize vulnerabilities.
  • Upgrade of Connect:Direct software from 4.0 to 4.1 Secure+, and configuration on 8 HA servers, running Linux.
  • Create, and Modify files and folders permissions on Windows, and Linux platform.
  • Administer elevated access to UNIX, LINUX and Windows servers.
  • Perform system quarterly updates (Windows and Linux).
  • Performed data migration across UNIX/Linux and Windows platforms.
  • Managed and maintained 1200+ UNIX/Linux and Windows servers.
  • Command line interface administration with Linux and Unix.
  • Learned within a short time UNIX, Linux, AIX and gained knowledge for three months.
  • Administered Linux servers running an application called Sensage.
  • Maintained the configuration files of UNIX servers, AIX, HP-UNIX, Solaris and Linux resulting in servers being security compliant.
  • Administer RISC application, network, and storage systems, including VMWare, HyperV, Windows and Linux systems.
  • Led maintenance security for all UNIX (150 environments including HPUX, Solaris, AIX, and Linux).
  • Installed trial Symantec DLP (data loss protection) device running on Linux.
  • Deployed and supported Application Whitelisting to ~800 business critical Windows and Linux servers.
  • Build custom kernels on Redhat Linux to optimize system performance and integrity.
  • Appointed Global Administrator of McAfee ePO, managing ~ 40,000 systems in a Windows, Mac and Linux environment.
  • Unlocked and reset passwords on Linux, UNIX, Aix platforms for Axciom and for Trans Union associates.
  • Supported all internal servers, workstations, and laptops running Windows [ ] Linux, Solaris and HP-UX.
  • Experience on both Microsoft & Linux operating systems Analyze / Investigate / Identify / Remediate Incidents.

Show More

35. HR

low Demand
Here's how HR is used in Security Administrator jobs:
  • Analyzed effectiveness of information security technical controls designed to mitigate vulnerabilities and threats in various system life cycle stages.
  • Prioritize identified application and infrastructure vulnerabilities; oversee timely remediation; and threat monitoring.
  • Organized transactions in chronological order to provide easy access to information.
  • Assessed new and existing corporate initiatives through comprehensive risk analysis.
  • Provide research information of security threats to supported personnel.
  • Review Cisco FireSight alerts & daily reports for potential threats that need to be investigated & make setting changes/additions as needed.
  • Interfaced the Time Collection devices interface of Time and Labor module in concert with HR & North American Payroll.
  • Worked problems (Remedy ARS) and escalated issues to center management and sent out daily threat reports.
  • Developed and distributed Intelligence Objects (security reports and updates) updating clients on imminent threats.
  • Provided day-to-day efficient HRMS and Finance system functionality to the HR and Financial Services Business unit.
  • Lead the End User Report deployment initiative in SQR & Crystal for HRMS and Benefits module.
  • Operated hand-wands, walk through metal detectors, various x-ray machines, and IED detection devices.
  • Acted as a liaison between HR, Procurement, DB, Infrastructure and Web teams.
  • Set up and troubleshoot Soft token access through AT&T broadband services.
  • Assessed ambient threats and created the organization's security posture.
  • Supported three to nine simultaneous projects any given time.
  • Worked in PeopleSoft HRMS 7.51 and People Tools 7.58.
  • Accomplished security application concepts by installing proper anti-virus and malware, assessed threats and counter-measures.
  • Installed a password synchronization application called P-Synch to reduce password and login issues to the help desk by nearly 90%.
  • Implemented HR, Ben, Payroll, ePay, eRecruit, eProfile and eBenefits - Peoplesoft 8.8 with Tools 8.42.

Show More

36. Security Systems

low Demand
Here's how Security Systems is used in Security Administrator jobs:
  • Developed a risk analysis matrix, contingency and recovery plan for the physical security systems and network infrastructure.
  • Use security systems and database applications to in-process staff and visitors at assigned facility.
  • Monitor current reports of computer security to determine when to update security systems.
  • Conducted audits and ensured physical security systems were regularly serviced and maintained.
  • Monitored electronic security systems and trained data center emergency response teams.
  • Recognized problems with security systems by identifying abnormalities and reporting violations.
  • Provided domestic and international technical support for multiple security systems.
  • Monitored security systems and logs for signs of malicious activity.
  • Provided support for various security systems and business users.
  • Evaluated current security systems and streamline process.
  • Oversee the security systems, responding to alarms, granting and denying access, complying with governmental mandated requirements.
  • Ensured security systems were compliant IAW JAFAN 6/0 and 6/9 and information systems were compliant IAW JAFAN 6/3.
  • Monitored and serviced main security systems (card access) and equipment (hand-held radio, keys).
  • Monitor multiple corporate security systems including but not limited to intrusion, fire and BAS systems.
  • Mastered and operated the administration of security systems: SAFE, CCURE, VMS systems.
  • Steered the continuing development of the enterprise's security systems and processes.
  • Verify Quality control function of physical security systems, such as CCTV
  • Administrated the following security systems software such as: Navco, GMS 16, and GMS 32.
  • Improved server security systems according to industry best practices and segregation of job duties.
  • Coordinate with Schering Plough Security to allow site access across two separate security systems.

Show More

37. Technical Support

low Demand
Here's how Technical Support is used in Security Administrator jobs:
  • Provide orientation and training to the technical support team in security-related matters to assist in managing security issues affecting the network
  • Recommended security software upgrades or new product migrations to most effectively meet client needs and enable continued technical support.
  • Provided technical support and consultation for enhancement of and change to network security configuration.
  • Provided Windows technical support and troubleshooting to over 100 clients, both on-site and remotely over phone and email.
  • Provided technical support to clients; screened and transferred calls to appropriate security offices.
  • Key member responsible for providing technical support for Identity and Access Management system upgrade.
  • Provide technical support to shift to assist with procedure and plan compliance.
  • Provided server management and technical support for the network of 60+ clients.
  • Provide technical support of hardware, systems, sub-systems, and/or applications.
  • Managed call flow and responded to technical support needs of customers.
  • Assist technical support with network security updates, additions and deletions.
  • Provided technical support in a large 24x7 data center environment.
  • Provide second-level technical support for The Dow Chemical Company.
  • Provided technical support and training for new employees.
  • Provide Customer and user Technical support.
  • Performed product implementations and provided technical support for various applications on the product, a unified threat management security appliance.
  • Provided technical support for proper use of TCP/IP and use of various software packages such as Rumba, Extra/Attachmate, QWS.
  • Assisted in providing technical support to customers who need advice, assistance, and training in applying HW and SW systems.
  • Provide functional guidance, supervision, technical support, training and quality assurance/quality control to SIPRNet users and staff.
  • Corrected over 1300 security errors in the first audit 6 Sigma Green Belt Provided level 2 technical support

Show More

38. RSA

low Demand
Here's how RSA is used in Security Administrator jobs:
  • Defined network topology and oversaw implementation.
  • Provided instructions and troubleshoot users' access with firewall client and RSA SecurID authentication in accessing web application resources.
  • Worked with various managers to coordinate the most efficient replacement of RSA tokens within their group.
  • Support RSA Manager administration and managed the token conversion project over which reached over 6000 users.
  • Managed, consulted and oversaw computer, fraud and theft incident responses.
  • Granted access to RSA SecurID hard and soft tokens for remote access.
  • Configured remote access using RSA SecurID and other web portal applications.
  • Established and oversaw a visitor control program.
  • Generate report on RSA console for housekeeping.
  • Work daily with SECURE, HPSM, RSA Console, Outlook, and UPS Campus ship.
  • Document Control Specialist Oversaw daily operation of DARPA's Collateral Classified Document Program.
  • Developed and implemented physical security training programs for Raytheon/Allied Universal security teams.
  • Analyze event logs for suspicious activity and investigate anomalies using RSA enVision.
  • Designed and oversaw installation along with daily maintenance of a colocation, for disaster recovery purposes in Columbia, SC.
  • Used Virsa Compliance Calibrator (VRAT) to diagnosis SOD issues and work with mitigation controls.
  • Performed extensive translations for both documents and verbal statements from English to Arabic and vice versa.
  • Installed, Configured and administered RSA Aveksa, SiteMinder 5.x/6.x and Sun One Directory Server.
  • Created Universal Desktop ghost Image Via Sysprep, kept image up to date with patches
  • Installed, Configured, Administered and Monitored RSA Aveksa on windows platforms.
  • Generated report on RSA Security console Service Now Remedy - Ticketing tools Remedy Service now

Show More

39. Sharepoint

low Demand
Here's how Sharepoint is used in Security Administrator jobs:
  • Handled MS SharePoint issues including adding/deleting users, troubleshooting access issues/requests, documentation & escalations, etc.
  • Used SharePoint to generate technical reports documenting removal/denial of access to terminated employees nationwide.
  • Maintained SharePoint documentation regarding the addition, removal and updating of user account
  • Use SharePoint and ClinTrak effectively to provide access and organization to documentation.
  • Coordinated with SharePoint designer to develop new SharePoint flows.
  • Developed and maintained SharePoint sites for department.
  • Designed SharePoint Services site to maintain licensing and documentation for all procedures within ITS department.
  • Create business unit sites in SharePoint 2007, currently migrating to SharePoint 2010.
  • Assisted in design and creation of a new department portal using SharePoint.
  • Serve as the DERO Training Staff Web Designer for SHAREPOINT Website.
  • Full support of 6 unique SharePoint farms and all versions.
  • Developed Help Desk Portal utilizing Microsoft SharePoint (MOSS).
  • Used SharePoint for Documentation and policy and compliance.
  • Work with SharePoint online Operation team.
  • Utilized Sharepoint system online for creation and release of procedural documentation.
  • Managed Windows Active Directory, Exchange, Physical Door Card Security System, administered Microsoft Sharepoint, and Mobile Device Management.
  • Lead a project to build a SharePoint site collection to handle Customer Relationship & IT ticket system.
  • Streamline the process flow of Basis documentation at SharePoint to onsite and offshore teams.
  • Content administrator for local hospital intranet site and IT Compliance Sharepoint site.
  • Assisted managing project Sharepoint site for Security Operations and project teams including Cerner.

Show More

40. Law Enforcement

low Demand
Here's how Law Enforcement is used in Security Administrator jobs:
  • Fostered relationships with stakeholders such as Law Enforcement Officers & airline representatives to maximize communication and teamwork during emergency situations.
  • Communicated with law enforcement to verify fugitive warrant information and provide pertinent information to assist with the apprehension of fugitives.
  • Develop collaborative relationships with local/state/federal law enforcement agencies to meet organizational goals.
  • Maintain confidentiality and communicate with law enforcement authorities if necessary.
  • Maintained detailed records of Security incidents and law enforcement actions.
  • Recognized, apprehended, and arrested suspects of crimes committed on company property, serving as liaison with law enforcement.
  • Maintained contact with building security, local law enforcement, and fire department personnel as needed.
  • Worked closely with local, state, and federal law enforcement to ensure airport safety.
  • Worked with law enforcement personnel to ensure the highest conduct and management of incidents.
  • Coordinate security operations or activities with public law enforcement, fire and other agencies.
  • Interfaced with law enforcement agencies including local police and the FBI on criminal matters.
  • Handled incidents and created incident reports for senior leadership and Law Enforcement Officers.
  • Coordinate federal, state, and local emergency services and law enforcement.
  • Work closely and in collaboration with Stakeholders and local Law Enforcement.
  • Train and skilled in a wide variety of law enforcement tasks.
  • Reported all incidents, accidents and medical emergencies to law enforcement.
  • Prepare incident reports when law enforcement is involved.
  • Conduct training and outreach activities with otheraviation community entities, including law enforcement and other Federal agencies.
  • Administered an internal investigative and asset protection process, Developed safety/training programs for management LAW ENFORCEMENT EXPERIENCE:
  • Coordinate with Scottrade Center management and local law enforcement officials to provide a safe and secure environment for events.

Show More

41. Nispom

low Demand
Here's how Nispom is used in Security Administrator jobs:
  • Developed presentations for Proper Courier Handling Procedures, Custodians, and Quarterly Refresher Security briefings according to NISPOM standards.
  • Experienced in Facility Security Officer duties by managing multiple Defense Security Service facility clearances IAW NISPOM.
  • Conduct oral security briefings and debriefings required under NISPOM regulations.
  • Enforced the security administrative duties required by the National Industrial Security Program Operating Manual (NISPOM) and other customer directives.
  • Prepared initial, crossover, or upgrade clearance packages following proper guidelines outlined in the NISPOM and DCID 6/4.
  • Possess a working knowledge of, e-QIP, JPAS, NISPOM, DCID's and other related security directives.
  • Provide information and industrial program support, and personnel security In accordance with JAFAN and NISPOM regulations.
  • Assist FSO in implementation and maintenance of the NISPOM requirements and various other related Federal Government requirements.
  • Evaluate and administer security guidelines associated with personnel security, in accordance with the NISPOM.
  • Maintained and employed Security Policy and Procedures and training in accordance with the NISPOM.
  • Investigate crimes, NISPOM violations, accidents, breeches, and UCMJ infractions.
  • Improved understanding of the National Industrial Security Program Operating Manual (NISPOM).
  • Implemented a thorough security program in accordance with NISPOM and NSA 3-16 standards.
  • Ensured the classification directives were marked and maintained in accordance with NISPOM.
  • Assisted with coordination of building construction through ICD and NISPOM requirements.
  • Comply with all NISPOM and DOD Regulations under USG Requirements.
  • Process all clearances in accordance with NISPOM regulation policy to include initial investigations, periodic reinvestigations and transfers.
  • Assist Program Managers in the interpretation, application and compliance with Security Classification Guides (SCGs) and NISPOMpolicies.

Show More

42. Citrix

low Demand
Here's how Citrix is used in Security Administrator jobs:
  • Implemented and supported McKesson proprietary software within a Citrix environment.
  • Worked with VPN remote access (Cisco-Checkpoint) Citrix environment and Service Manager Tool.
  • Maintain a Citrix RSA token secured Repository environment complying with PCI DSS regulations.
  • Support Windows NT4.0/2000, Citrix XP servers, all clients and supported applications.
  • Manage mission critical applications via load balancing Citrix Server farms.
  • Maintained several Citrix servers for packaging and testing.
  • Created, maintained and used 15 Citrix server images within VMWare for packaging and testing.
  • Oversee ADP HR Etime management for IT department via Citrix connections.
  • Implement, maintain, and administer Citrix and VMware installations.
  • Profiled the applications by using Citrix Streaming Profiler.
  • Used Citrix/Metaframe for Thin Client processing.

Show More

43. Security Requirements

low Demand
Here's how Security Requirements is used in Security Administrator jobs:
  • Maintained liaison with Contract Security Supervisors ensuring federal mandated physical security requirements were maintained with an emphasis on classified information safeguards.
  • Develop a Standardization/Evaluation Program to forecast long range security requirements and new policies of the Joint Base Security Forces.
  • Directed and administered contractual security requirements for a manufacture facility, which housed over 800 program personnel.
  • Applied and disseminated Department of Defense security requirements for a National Command Authority level fielded program.
  • Analyzed and evaluated technology and network services for current and future network security requirements.
  • Assisted Facility Security Officer in the performance of personnel and physical security requirements.
  • Verified and validated hardware is fully compliant with DoD security requirements and specifications.
  • Monitor controls post authorization to ensure continuous compliance with the security requirements.
  • Trained security and subject matter personnel in security requirements and procedures.
  • Briefed/debriefed employees and vendors on all aspects of security requirements.
  • Maintained security documentation and ensured current security requirements were implemented.
  • Reviewed and developed contract security requirements for DD254s.
  • Ensured compliance with U.S. Government security requirements.
  • Ensured that proper procedures were followed and that all security requirements were met before access was granted to certain employees.
  • Managed relationships and security requirements for 8 separate DOJ offices with specific security requirements to each of the 8.
  • Developed a program to forecast long range security requirements and policies to protect classified information of ID media.
  • Updated progress reports and met with team every week, guaranteeing security requirements are administered.
  • Assist the FSO with reviewing DD-254 s to interpret and implement specific security requirements.
  • Gather, organize, define, analyze and implement INFOSEC security requirements.
  • Analyzed and translated IT security requirements into documented controls, workflows, processes and procedures.

Show More

44. Ldap

low Demand
Here's how Ldap is used in Security Administrator jobs:
  • Configured LDAP authentication for BCD Travels to authenticate PeopleSoft security with Network Security.
  • Maintained web records, portal roles, LDAP accounts, active directory, and bookmark groups.
  • Installed storage systems based on Samba/LDAP/Radius to deliver secure access to services.
  • Implemented FTP infrastructure that uses LDAP for authentication and supports virtual domains.
  • Set up users and systems on LDAP, configured systems with MQ.
  • Managed the Active Directory & LDAP accounts, users and group access.
  • Integrated Policy Store with LDAP to use LDAP user repository.
  • Assisted and developed scripting for terminations in LDAP and OIM.
  • Created custom LDAP schema to support infrastructure.
  • Experience in implementing LDAP security models.
  • Created the front end for Admins to add and remove users from LDAP and from the LDAP static groups.
  • Managed LDAP, SSH, SUDO, and Active Directory.
  • Installed companywide storage system based on Samba/LDAP/Radius which enabled remote users secure access to sensitive information.
  • Installed, configured and integrated Web servers (plug-in file), Siteminder agents and LDAP user directory with WLS.
  • Worked on tuning of Siteminder, Agents, DIT's & LDAP configuration parameters for better Throughput & response time.
  • Developed a system that uses data from LDAP and local templates to dynamically provision and re-provision virtual domains.
  • Integrated web applications with SiteMinder, Sun ONE LDAP server using custom APIs and various affiliate agents.
  • Experience in configuring multiple LDAP instances and defined LDAP Schemas.

Show More

45. Racf

low Demand
Here's how Racf is used in Security Administrator jobs:
  • Worked initially as a LAN Administrator was also cross-trained for RACF Mainframe daily security administration.
  • Trained Resource Access Management Facility (RACF) administrator requiring a Security Clearance.
  • Coordinated approximately 50 department RACF administrators for group access control.
  • Trained RACF administrators supporting application and system functions.
  • Maintained and administered mainframe RACF security system.
  • Preformed technical troubleshooting within an enterprise environment, including system crashes, slow-downs and data recoveries using ACF2 and RACF commands.
  • Planned and implemented a project to migrate existing IBM's RACF external security controls to CA-Top Secret.
  • Manage RACF and application use based on company security guidelines, maintaining accurate records for auditing purposes.
  • Support included the security administration and monitoring in RACF, ACF2, and Top Secret.
  • Managed RACF Security in production, test and sandbox LPAR's for over 10,000 users.
  • Processed security for various platforms (RACF, UNIX, Windows 2000 Procurement).
  • Headed project to convert the existing RACF external security controls to CA-Top Secret.
  • Maintained RACF databases for several clients from the Delivery Center.
  • Helped convert IMS security from SMU to RACF.
  • Created mainframe accounts in RACF.
  • Represented Logical Security team on audits Set up digital certificates in RACF.
  • Monitored RACF database usage and did reorgs when needed.
  • Provision Internal/External/Systems ACIDS on RACF and Top Secret.
  • Job Responsibility: Creating accounts on RACF( OS/390 Security Server) Amending access to user Ids.
  • Set up the RACF structure to lock down Sarbanes Oxley datasets.

Show More

46. DSS

low Demand
Here's how DSS is used in Security Administrator jobs:
  • Coordinated annual penetration test with external vendor per PCI DSS regulatory requirements.
  • Prepare and complete self-inspections and DSS Vulnerability Assessments.
  • Develop and documents technical processes and procedures as needed to meet Defense Security Services, (DSS) Standard.
  • Prepare necessary paperwork in support of a DSS investigation or annual visit and meets with DSS representative upon request.
  • Assisted the Facility Security Officer with annual internal audits and inspection as well as external audits performed by DSS.
  • Develop and implement secure systems configurations in accordance with requirements of NIST, PCI-DSS, HIPAA and other authorities.
  • Participated in annual PCI DSS audit and SOC I audit with risk management team and external auditors.
  • Conduct internal security audits and insure compliance to applicable standards such as PCI DSS and ISO 27002/17799.
  • Assisted the FSO with generating special reports and key correspondence to Defense Security Service (DSS).
  • Implemented and ensured the company meets all its requirements towards achieving and maintaining the PCIDSS certification.
  • Passed DSS Inspections meeting NISPOM requirements * Managed JPAS SMO Code/PSM NET for Southeastern Operations
  • Completed network and systems compliance tasks to adhere to PCI DSS regulatory requirements.
  • Aided in the preparation of the facility for a DSS inspection.
  • Maintain all security documentation and files in accordance with DSS requirements.
  • Conducted status checks with DSS.
  • Act as a liaison and POC for DSS.
  • Assisted risk management team with identifying IT risk gaps for PCI DSS/SOC I/SOC II audits.
  • Ensured continual security and SAS70PCI-DSS compliance for an array of 75 Windows [ ] servers.
  • Coordinate all reportable action through the DSS Industrial Security Representative.
  • Submited Initial Clearances, Upgrades and Periodic Reinvestigations for processing through DSS.

Show More

47. Comsec

low Demand
Here's how Comsec is used in Security Administrator jobs:
  • Supervised eight Security Coordinators and one Security Liaison in control and accountability of COMSEC material during manufacturing process.
  • Manage classified networks appropriately, observing Communication Security (COMSEC) standards and training requirements.
  • Initiated and established classified mailing procedures/shipping of audio and visual classified and COMSEC materials.
  • Prepared, developed and administered Government Security Informational/COMSEC and Safety Programs.
  • Ship, receive, and track IT materials for use at MSPMO while observing COMSEC policies, procedures, and guidelines.
  • Promoted by upper management to COMSEC (Communication Security) to provide administrative support to the Defense Information Systems Agency.
  • Serve as facility alternate custodian for COMSEC and classified storage equipment and devices; safes, alarms, combination locks.
  • Served as the ComSec and EKMS Account custodian and maintained positive accountability of over 700 items both CONUS and OCONUS.
  • Maintained security databases (COMSEC Access Briefs, Foreign National Visitors, Visit Certifications and Personnel Clearance Verification).
  • Maintained up-to-date records and submitted accounting reports for COMSEC account with approximately 1,500pieces used by 35 company engineers.
  • Provide Security/COMSEC direct support and service to the agency security program.
  • Processed orders for NIPR/SIPR/ATM/DVS-II COMSEC keying material and equipment through DISA.
  • Safeguard and account for NSA issued equipment as Alternate COMSEC Custodian.
  • Maintained Top Secret keying material for over 25 COMSEC accounts.
  • Provided briefings and training for couriers and COMSEC account personnel.
  • Provide COMSEC support to the COMSEC Custodian.
  • Implemented In-Process manufacturing and accountability processes for approximately 20 COMSEC programs containing Crypto.
  • Provided document control, physical security, alternate COMSEC custodian duties, and badging support for the industrial security program.
  • Managed COMSEC accounts with total responsibility for secure voice STU-III/data cryptographic systems SOCOM, keying inventory.
  • Work directly with the COMSEC Manager and FSO for the facilitation of VARS and CRFs.

Show More

48. Security Department

low Demand
Here's how Security Department is used in Security Administrator jobs:
  • Provided the Security Department with personnel records, classified materials, policies/procedures for the annual Defense Security Service Inspection.
  • Provided complete administrative support to the Security department tasked to provide security for Naval Station San Diego.
  • Assisted Facility Security Officer in developing policies and procedures for the security department.
  • Represent the Industrial Security Department in customer meetings and security conferences.
  • Provide administrative and data entry support to the Security Department.
  • Performed various clerical and administrative duties for the Security Department.
  • Managed operations of the security department.
  • Designed policy tree outline for Corporate Security department and created and published 12 new policies in four months.
  • Validated all access records within JPAS and ensured valid, accurate entries to maintain an organized Security Department.
  • Supervised security department with a staff of 39 off duty police officers and 10 full-time civilian employees.
  • Created a procedure manual for our security department, thus improving training methods for future new hires.
  • Provided back-up support to the Security department by means of emergency, safety, and training responses.
  • Provide support to the personnel security department of the Mission Integration Business Unit (MIBU).
  • Coordinated with the Security Department concerning all VIP visits and meetings for classified and foreign contacts.
  • Coordinated & automated the Security Department's flow of paper information and made it electronic.
  • Resolved complex unique problems related to the management of the security department.
  • Designed and implemented lost and found log for casino and security department.
  • Assisted the FSO in reorganizing and improving existing Security Department processes.
  • Provided technical and administrative support for the Global Security Department Managed user accounts for a global corporation.
  • Coordinate with various onsite departments and other local Site Security Departments to issue new or reprinted ID badges.

Show More

49. Cctv

low Demand
Here's how Cctv is used in Security Administrator jobs:
  • Managed innovative, sophisticated systems by installing covert camera and designing solar-powered cellular CCTV systems for use on sites.
  • Managed all security functions including enterprise security access control, alarms and CCTV and executive protection as needed.
  • Reviewed CCTV video, investigating thefts and vandalism of company property on and off campus setting and on gas well pads.
  • Assisted in development of thorough Physical Security and access control program to include CCTV, Intrusion Detection, and Access control.
  • Monitored cameras through closed circuit television (CCTV), programmed recording patterns for digital cameras.
  • Provided comprehensive training to staff on use of CCTV, Access Control, and Fire/Alarm system.
  • Programmed access control panels and determined the positioning of CCTV cameras for various office sites.
  • Maintain the computer at the security department, maintain security of the property via CCTV.
  • Staff protection and staff escort * Property surveillance by CCTV or vehicle patrol.
  • Monitor CCTV's and over 70 cameras to observe all covert sites.
  • Maintain and manage the Closed Circuit Television CCTV system.
  • Manage access control and CCTV for 36 sites worldwide.
  • Monitor CCTV's and PP4/Picture Perfect Access Control System.
  • Monitor metal detectors and CCTV for the location.
  • Watch Pivot series cctv monitors covering 2500 apartments 59 buildings.
  • Monitored CCTV systems such as S2Netbox, Axis, Ganz, Mobotix, and Dedicated Micros.

Show More

50. Novell

low Demand
Here's how Novell is used in Security Administrator jobs:
  • Performed daily information security risk assessments and internal audits of LAN (Novell) and Mainframe (MVS/VSE) systems.
  • Maintained and administered a server farm of about 70 NT 4.x/2000 and Novell 4.x servers.
  • Maintained Windows, Novell, and System i user databases.
  • Provided troubleshooting support for Windows, Novell and Mainframe systems.
  • Network Administration support for NT, Novell.
  • Upgraded clients for Novell 4x and reconfigured printers
  • Created RSA accounts * Created Novell accounts

Show More

20 Most Common Skill for a Security Administrator

Security Procedures15.7%
Joint Personnel12.2%
Data Entry7.9%
Windows XP7.1%
Active Directory6.9%
Customer Service5.7%
Security Policies5.2%
Security Clearance5%

Typical Skill-Sets Required For A Security Administrator

RankSkillPercentage of ResumesPercentage
1
1
Security Procedures
Security Procedures
10.5%
10.5%
2
2
Joint Personnel
Joint Personnel
8.2%
8.2%
3
3
Data Entry
Data Entry
5.3%
5.3%
4
4
Windows XP
Windows XP
4.7%
4.7%
5
5
Active Directory
Active Directory
4.6%
4.6%
6
6
Customer Service
Customer Service
3.8%
3.8%
7
7
Security Policies
Security Policies
3.5%
3.5%
8
8
Security Clearance
Security Clearance
3.4%
3.4%
9
9
Access Control
Access Control
3%
3%
10
10
Transportation Security
Transportation Security
2.1%
2.1%
11
11
Mainframe
Mainframe
2.1%
2.1%
12
12
User Accounts
User Accounts
2%
2%
13
13
Unix
Unix
2%
2%
14
14
Information Security
Information Security
1.9%
1.9%
15
15
VPN
VPN
1.8%
1.8%
16
16
Jpas
Jpas
1.7%
1.7%
17
17
Social Security
Social Security
1.7%
1.7%
18
18
Setup
Setup
1.6%
1.6%
19
19
Troubleshoot
Troubleshoot
1.6%
1.6%
20
20
SOX
SOX
1.5%
1.5%
21
21
Security Personnel
Security Personnel
1.5%
1.5%
22
22
Security Access
Security Access
1.5%
1.5%
23
23
SQL
SQL
1.5%
1.5%
24
24
User Access
User Access
1.5%
1.5%
25
25
DOD
DOD
1.4%
1.4%
26
26
TSA
TSA
1.4%
1.4%
27
27
Lotus Notes
Lotus Notes
1.4%
1.4%
28
28
Security Issues
Security Issues
1.4%
1.4%
29
29
Phone Calls
Phone Calls
1.3%
1.3%
30
30
Internet
Internet
1.2%
1.2%
31
31
SCI
SCI
1.2%
1.2%
32
32
Peoplesoft
Peoplesoft
1.2%
1.2%
33
33
IDS
IDS
1.2%
1.2%
34
34
Linux
Linux
1.1%
1.1%
35
35
HR
HR
1.1%
1.1%
36
36
Security Systems
Security Systems
1.1%
1.1%
37
37
Technical Support
Technical Support
1.1%
1.1%
38
38
RSA
RSA
1%
1%
39
39
Sharepoint
Sharepoint
1%
1%
40
40
Law Enforcement
Law Enforcement
0.9%
0.9%
41
41
Nispom
Nispom
0.9%
0.9%
42
42
Citrix
Citrix
0.8%
0.8%
43
43
Security Requirements
Security Requirements
0.8%
0.8%
44
44
Ldap
Ldap
0.8%
0.8%
45
45
Racf
Racf
0.8%
0.8%
46
46
DSS
DSS
0.8%
0.8%
47
47
Comsec
Comsec
0.8%
0.8%
48
48
Security Department
Security Department
0.8%
0.8%
49
49
Cctv
Cctv
0.8%
0.8%
50
50
Novell
Novell
0.8%
0.8%

33,737 Security Administrator Jobs

Where do you want to work?