Respond to and manage security incidents by containing active threats, supporting remediation efforts, and documenting findings for Security Analyst and Security leadership.
Identify, assess, and coordinate remediation of critical vulnerabilities in collaboration relevant stakeholders.
Administer and maintain security policies, tools, and platforms, including endpoint protection, firewalls, email and web security, certificates/PKI, vulnerability management, remote access, among others, to ensure secure network and boundaries.
Maintain patching infrastructure and system hardening standards; partner with technical teams to ensure systems remain compliant with security requirements.
Administer identity and access management solutions, including IdP platforms, SSO integrations, access reviews, and authentication policies.
Develop and administer Identity and Access Management, Privileged Identity Management, and Role-Based Access Control policies and roles, including the secure management and lifecycle oversight of service accounts, SPNs, and managed identities.
Perform backup validation and testing and support disaster recovery planning, testing, and readiness activities.
Requirements
Two-year degree in CyberSecurity, System Administration, or related field of study.
Five+ years of work experience in cybersecurity and/or IT infrastructure administration.
Experience developing scripts using PowerShell, Python, or Perl and integrating with APIs to support automation and system administration.
Strong knowledge of MS365 and Azure services.
Ability to utilize modern security platforms and monitoring tools (e.g. SIEM, EDR, MS Purview) in accordance with industry standards to investigate alerts, analyze threats, and support incident response activities.
Understanding of network security controls, firewall policies, secure remote access, and cloud security principles (e.g. TCP/IP, DNS, VLAN, NAT, and TLS) across modern platforms (e.g. Azure, AWS).
Ability to administer and secure Windows and Linux servers and endpoints while maintaining stable and compliant systems.
Knowledge of identity platforms, authentication protocols, and privileged access methodologies used to manage and secure system access (e.g. Entra, SAML, OIDC; knowledge of PIM, PAM, and RBAC methodologies).
Ability to use scripting languages and APIs to automate administrative tasks and improve operational efficiency.