IT Security Administrator

Overview

On Site
USD 63,000.00 - 88,000.00 per year
Full Time

Skills

Banking
Backup
Identity Management
System Monitoring
Standard Operating Procedure
Policies and Procedures
Group Policy
Business Rules
System Security
Recovery
Computer Hardware
Server Hardware
Optimization
Conflict Resolution
Problem Solving
Testing
Computer Networking
Performance Tuning
Risk Management
System Administration
Network
Hardening
Operating Systems
Command-line Interface
File Systems
NTFS
EXT
Virtualization
Virtual Machines
Access Control
Network Protocols
TCP/IP
DNS
Dragon NaturallySpeaking
Directory Services
IT Architecture
Systems Engineering
Virtual Private Network
WAN
Management
Information Technology
IT Security
Firewall
Encryption
Cyber Security
Data Security
Network Security
Apache Flex
Insurance
Compensation Management
Screening
PASS
Business Transformation
Law

Job Details

Aloha! One of Hawaii's largest and oldest banks is seeking a Security Administrator!
Description
Develops, administers and maintains security policies, system policies, backup processes, batch jobs, and Identity and Access Management (IAM). Monitors scheduled tasks, IAM alerts and alarms. Collaborates closely with NOSC on cyber defense and system monitoring.
Develop and document systems administration standard operating procedures. Comply with organization systems administration standard operating procedures. Implement and enforce usage policies and procedures. Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
Manage accounts, network rights, and access to systems and equipment. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Maintain baseline system security according to organizational policies.
Monitor and maintain system/server configurations. Perform repairs on faulty system/server hardware. Plan, execute, and verify data redundancy and system recovery procedures. Troubleshoot hardware/software interface and interoperability problems. Check system hardware availability, functionality, integrity, and efficiency.
Conduct periodic system maintenance including cleaning (electronically), disk checks, routine reboots, data dumps, and testing. Diagnose faulty system/server hardware. Provide ongoing optimization and problem-solving support. Conduct functional and connectivity testing to ensure continuing operability.
Participates in Company emergency response activities as assigned, including any activities required to prepare for such emergency response.
Additional Skills & Qualifications
Computer networking concepts and protocols, and network security methodologies
Measures or indicators of system performance and availability
System performance tuning tools and techniques
Principles and methods for integrating system components
Risk management processes (e.g., methods for assessing and mitigating risk)
Systems administration concepts
Server and client operating systems
Basic system administration, network, and operating system hardening techniques
Operating system command line/prompt
System/server diagnostic tools and fault identification techniques
File system implementations (e.g., New Technology File System (NTFS), File Allocation Table (FAT), File Extension (EXT))
Virtualization technologies and virtual machine development and maintenance
Organizational information technology (IT) user security policies (e.g., account creation, password rules, access control)
Network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System
(DNS), and directory services
The type and frequency of routine maintenance needed to keep equipment functioning properly
Enterprise information technology (IT) architecture
Systems engineering theories, concepts, and methods
Virtual Private Network (VPN) security client configurations
Local area and wide area networking principles and concepts including bandwidth management.
Information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption)
Specific operational impacts of cybersecurity lapses
Cyber threats and vulnerabilities and cybersecurity principles
Personally Identifiable Information (PII) data security standards and concepts
Network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Pay and Benefits
The pay range for this position is $63000.00 - $88000.00/yr.
Drug/Optical Plans
Flex Spending Accounts
Employee Assistance Program
Sick Leave
Long-Term Disability Insurance
Workers' Compensation
Health Screening
Wellness Education
Twelve Full Paid Holidays and Two Half-day Holidays
Vacation
Bonus Vacation Day for Taking Minimum Sick Leave
Voluntary Educational Assistance Program
Family and Medical Leave
Bus Pass Reimbursement
Adoption Expense Reimbursement Program
PATCH Enhanced Child Care Referral Program
Bereavement Leave
Workplace Type
This is a hybrid position in Honolulu,HI.
Application Deadline
This position is anticipated to close on May 23, 2025.

About TEKsystems and TEKsystems Global Services

We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.

The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About TEKsystems c/o Allegis Group