Recent Searches

You haven't searched anything yet.

13 Network and Security Administrator Jobs in Miami, FL

SET JOB ALERT
Details...
Carnival Cruise Line
Miami, FL | Full Time
$100k-119k (estimate)
1 Week Ago
Diverse Lynx
Miami, FL | Full Time
$86k-105k (estimate)
1 Week Ago
Femwell Group Health
Miami, FL | Full Time
$93k-117k (estimate)
2 Weeks Ago
Miami Dade College
Miami, FL | Full Time
$92k-112k (estimate)
3 Months Ago
Aegistech Inc.
Miami, FL | Contractor
$122k-142k (estimate)
2 Weeks Ago
Aegistech Inc.
Miami, FL | Contractor
$122k-142k (estimate)
2 Weeks Ago
AECOM Corp. - Worldwide
Miami, FL | Full Time
$99k-123k (estimate)
1 Month Ago
AECOM
Miami, FL | Full Time
$99k-123k (estimate)
1 Month Ago
America Zenith
Miami, FL | Full Time
$92k-114k (estimate)
7 Days Ago
INSPYR Solutions
Miami, FL | Part Time
$99k-118k (estimate)
1 Week Ago
ClickJobs.io
Miami, FL | Full Time
$164k-204k (estimate)
2 Weeks Ago
Kaizen Technologies
Miami, FL | Contractor
$92k-116k (estimate)
3 Days Ago
Tech Army
Miami, FL | Contractor
$85k-108k (estimate)
3 Months Ago
Network and Security Administrator
Apply
$93k-117k (estimate)
Full Time 2 Weeks Ago
Save

Femwell Group Health is Hiring a Network and Security Administrator Near Miami, FL

  • Designing and implementing new network solutions and/or improving the efficiency of current networks
  • Installing, configuring, and supporting network equipment including routers, proxy servers, switches, Firewalls, VPN, WAN accelerators, DNS and DHCP
  • Procuring network equipment and managing subcontractors involved with network installation
  • Configuring firewalls, VPN, routing, and switching to maximize network efficiency and security
  • Maximizing network performance through ongoing monitoring and troubleshooting
  • Leading and performing scheduled upgrades
  • Investigating faults in the network
  • Leads, Coordinates and configures network equipment to the latest firmware releases
  • Vulnerability Management - Leads, Coordinates and Maintains inventories and inventory processes of information resources protected by security regulations so vulnerability assessments can be performed. Uses tools and processes to effectively carry out vulnerability testing. Monitors and improves vulnerability management processes and procedures. Interprets scanning or testing results and provides consultation to network, workstation, systems, or web-applications administrators regarding system and application weaknesses. Appropriately escalates issues presenting unacceptable risk to the IT leadership. Monitors risk mitigation progress.
  • Security Architecture, Consulting and Evaluation - Leads, Coordinates and develops security architecture components for newly proposed information systems and technologies using diagrams and narratives. Assists in materializing security architecture into projects. Develops and maintains and applies tools, processes and procedures to evaluate suitability of security configuration and feature offerings of proposed systems.
  • Information Security Risk Analysis - Leads, Coordinates and Develops, maintains and applies tools, methods and processes to analyze risk from threats to confidential information. Writes appropriate recommendations that will bring risks to an acceptable level. Develops and delivers audience appropriate information security assessment and recommendation presentations and reports. Establishes and maintains sound metrics to track and demonstrate information security improvement and risk management. Prepares risk assessment reports for technical and executive audiences.
  • Security Incident Prevention, Detection and Handling - Leads, Coordinates and Develops, maintains, communicates and applies incident management policy, standards and procedures. Researches, evaluates, recommends, designs technical policies for and implements security technologies such as web content filtering systems, email filtering systems, end point protection systems, network firewall systems, intrusion prevention and detection systems (IDS/IPS), data loss protection (DLP) systems, security incident event management (SIEM) systems to prevent, detect and respond appropriately to threats to confidential information and information resources. Monitors security systems; recognizes anomalies of various systems, and handles or escalates appropriately. Writes professional and factual incident reports. Makes recommendations for recovery and prevention.
  • Data Analysis - Leads, Coordinates and Analyzes security threat intelligence, tunes and calibrates security systems to improve effectiveness. Analyzes and correlates network dataflow logs, web logs, computer and application user activity logs, and security incident logs for information relevant to a real or potential information security or privacy breach or to support decision making and risk mitigation.
  • Project Management - Lead discovery and information gathering sessions. Perform alternatives analysis documenting pros and cons, cost, feasibility, risk and other information to support a decision to select the best solution. Manage small to medium projects; assemble project participants to organize work to complete specific tasks on projects. Organize and facilitate meetings to identify and remove barriers, and to progress work. Follow-up with assignees on incomplete tasks and open issues. Provide detailed communication between disparate teams to keep project moving.
  • Other – Leads, Coordinates and Trains less experienced information security staff and IT staff regarding security methods for systems they support. Takes on-call for urgent security events. Performs other related duties as assigned.
  • Leads, Coordinates and Collaborates with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming or process changes.
  • Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
  • Leads, Develops and implements plans to safeguard digital data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs.
  • Reviews violations of security procedures; provides training to ensure violations do not recur.
  • Monitors and restricts access to sensitive, confidential, or other high-security data.
  • Leads, Coordinates and Modifies security files and applications as able and necessary to provide specialized access, allow new software to be installed or integrated, or correct errors.
  • Leads, Coordinates and Performs risk assessments, audits, and tests to ensure proper functioning of data processing activities and security measures.
  • Safeguards system security and improves overall server and network efficiency by training users and promoting security awareness.
  • Determines when to update virus protection systems by monitoring current reports of computer viruses; facilitates or performs needed updates.
  • Reporting network and security status
  • Other network and security projects as assigned

Essential Required Competencies

Specific knowledge and skill-based competencies required to satisfactorily perform the functions of the job include:

Demonstrated problem-solving and analytical skills.

Proficient, or able to gain proficiency with, a broad array of security software applications and tools.

Thorough understanding of computer-related security systems including firewalls, encryption, and password protection and authentication.

Proficient in Microsoft Office Suite or related software.

Excellent verbal and written communication skills.

Organized with attention to detail.

An analytical mind

An ability to learn new technologies quickly

Good time management skills

An ability to follow processes

Strong documentation skills

Commercial and business awareness

Education, Experience, Skills, and Requirements

  • Associates or Bachelor’s degree in computer science, Programming, or a related field.
  • 3 years of experience working with Cisco, SonicWall, Fortinet, Ubiquiti devices, switches, firewalls, VPN and network appliances is required.
  • At least three years of experience in computer systems with some specialization in computer security required.
  • Knowledge of HIPAA Security preferred
  • Hybrid rotation schedule or onsite as per need basis
  • Travel to Data Center or Medical office on a need basis is required.

Working Conditions

The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Work primarily in a climate-controlled environment with minimal safety/health hazard potential. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Job Summary

JOB TYPE

Full Time

SALARY

$93k-117k (estimate)

POST DATE

06/13/2024

EXPIRATION DATE

07/02/2024

WEBSITE

obgynofmiami.com

HEADQUARTERS

MIAMI, FL

SIZE

<25

FOUNDED

1986

CEO

JASON MATTHEW ZELLNER

REVENUE

<$5M

INDUSTRY

Ambulatory Healthcare Services

Show more

Femwell Group Health
Full Time
$108k-121k (estimate)
1 Week Ago
Full Time
$36k-43k (estimate)
1 Week Ago
Femwell Group Health
Full Time
$65k-87k (estimate)
2 Weeks Ago