0% found this document useful (0 votes)
1 views3 pages

Specialist Security Systems Administrator

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3

Global Position Description

Title: Specialist Security Systems Administrator


Hierarchical Level:
Division/Department: Information Technology
Reports to: Supervisor, Operations Support
Number of None
Direct Reports:
Travel: Domestic and International, 10% of time
Revision Date: 4/24/2023

Grade (US Only): FLSA (US Only): Type of Position:


HR To Determine Choose an item.

Summary:
The primary role of the Specialist Security Systems Administrator is to keep Hollister’s sensitive,
proprietary, and personal information safe from threats.

The Specialist Security Systems Administrator implements security processes and procedures for ongoing
management of the server environment and enterprise infrastructure applications.

Responsibilities:
In this section, list out in detail the responsibilties of the position, below are some tips on doing so. Please
type over the details and if you need to add additional bullets, just press the enter key.

1. Effectively partners with Cybersecurity and business units to deliver IT services.

 Monitor computer networks and systems for threats and security breaches
 Install, alter, and update security software and firewalls
 Test systems for potential vulnerabilities
 Develop systems and processes for security best practices throughout the company
 Prepare reports on security incidents and changing responses
 Implements key process improvements as they relate to the client/server environment.
 Collaborates, as needed, with systems engineering and database administration
functions to ensure the availability of corporate servers to meet business demands.

2. Maintains a working knowledge of technology and remains current with emerging


industry trends.
3. Establishes and tracks appropriate metrics and key performance indicators.
 Implements processes, tools, and supports ongoing service level measurement
metrics and reporting.
 Maintains support processes and ensures ongoing communication of such
processes to internal teams and business customers.

4. Identifies avenues for continuous improvement for services within scope of responsibility,
including new approaches and processes that would contribute to improvements within
department and to business growth/efficiency in the wider organization.
 Implements policies, procedures, and technologies to ensure server integrity and
security.

5. Provides business consulting and technical support to all business areas globally.
 Implements policies, procedures, and technologies to ensure server integrity and
security.
 Performs file system configuration and management; implements and performs
server backups and recovery procedures.
 Managing, installing, and operating security software
 Investigating security breaches and other cybersecurity incidents
 Document security breaches and assess the damage they cause
 Work with the security team to perform tests and uncover network vulnerabilities
 Fix detected vulnerabilities to maintain a high-security standard
 Help colleagues install security software and understand information security
management

Essential Functions of the Role**:


 Talk on the phone with suppliers and Hollister associates
 Read technical manuals / trade journals
 Use a personal computer and strong proficiency in MS Office
 Travel via plane or automobile
 Lift up to 70 lbs.
Work Experience Requirements
 Number of Overall Years Necessary: 5-8
 Minimum of 2 years of progressive technical IT experience with Bachelor's degree or 5 years of progressive
technical IT experience with a High School diploma.
 Proven work experience as a Cybersecurity Analyst or similar role
 Experience with computer network penetration testing and techniques
 Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts
 Ability to identify and mitigate network vulnerabilities and explain how to avoid them

Education Requirements
 BS/BA Computer Science or equivalent related field of study preferred. Specific vendor certifications desired

Specialized Skills/Technical Knowledge:


 Experience and working knowledge of Windows 2008/2012/2016 Server and Active Directory Domain design,
implementation, and administration.
 Thorough understanding of TCP/IP, DHCP, and DNS.
 Experience and working knowledge of Windows and Linux and Operating Systems. (Red Hat, SUSE)
 Working knowledge of general backup techniques using mainstream backup software.
 Knowledge of Microsoft Remote Desktop Services implementation and administration.
 Strong Knowledge of VMWare implementations and administration.
 Knowledge of SAN technology implementation and administration.
 Knowledge of VPN, Firewalls, routers, switches and switch protocols.
 Knowledge of Azure and cloud application integrations
 Proven work experience as a Cybersecurity Analyst or similar role
 Experience with computer network penetration testing and techniques
 Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts
 Ability to identify and mitigate network vulnerabilities and explain how to avoid them

Local Specifications (English and Local Language):
 FORMTEXT

** To comply with regulations by the American with Disabilities Act (ADA), the principal duties in job
descriptions must be essential to the job. To identify essential functions, focus on the purpose and the result
of the duties rather than the manner in which they are performed. The following definition applies: a job
function is essential if removal of that function would fundamentally change the job.

Date Approved by HR: Approved By: Date Posted:


Click here to enter a date. FORMTEXT To Be Completed Click here to enter a date.
By HR

You might also like