IT Distributed Systems Security Administrator in Atlanta, GA at HUNTER Technical Resources

Date Posted: 2/6/2020

Job Snapshot

Job Description

Skills Required:

  • In-depth knowledge of IT infrastructure security considerations Windows, Linux, AIX, Jboss, Weblogic, Office 365 (Azure AD, Exchange, TEAMs, OneDrive, etc.), Sterling Integrator B2Bi, IIS, Websphere MQ, Globalscape, Tuxedo, Cloud, etc.
  • Security monitoring and automation experience
  • Strong coding and scripting: Perl, Python, PowerShell, REST API
  • Experience with patch management solutions for Windows, UNIX, and Linux systems.
  • Experience working with audit and control processes such as SOX and PCI
  • Experience analyzing log information from disparate systems to identify security risk events
  • Experience with Splunk
  • Knowledge of Active Directory, LDAP, and identity management
  • Experience with SCCM, Ansible, and IBM BigFix Patch
  • Experience Qualys Vulnerability Management
  • Experience with system firewalls and UNIX security features; file permissions, sudo, SSH, authorized keys, encryption, syslog, etc.
  • Understanding of AD bridging and privileged access management solutions.
  • Experience in an analytical position responsible for managing complex infrastructure security
  • Understanding of change management processes associated with new technology implementation and ability to work with a project team to review security standards prior to a POC, pilot, or implementation

Experience Required:

  • 7+ years of IT security experience
  • 5+ years of Windows, Unix, Linux OS experience
  • 5+ years of experience with patch management solutions
  • 5+ years of scripting and/or coding experience

Responsibilities:

  • Review, revise, and audit security policies, standards and guidelines.
  • Perform IT risk assessments.
  • Work with the IT Security group to review vulnerability scans for server environment, and perform threat and vulnerability assessments.
  • Create remediation and/or mitigation strategies with IT SMEs and business owners to address and/or resolve business risks associated with vulnerabilities.
  • Monitor security threats, analyze vulnerability assessments, and balance security with business needs.
  • Perform application and infrastructure security vulnerability assessments across several systems which can include web services, cloud solutions, hardware, software, mobile management solutions.
  • Collaborate with various teams to ensure designs and implementations of existing hardware meet specified security standards.
  • Examine new technology proposals and perform security assessments on them.
  • Coordinate with IT Security and SMEs to provide security recommendations based on best practices and current policies and standards.
  • Define and implement efficient end-to-end security automation
  • Supports the existing security automation processes.