What are the responsibilities and job description for the IT Security Administrator position at Engility Corporation?
SAIC, a leading provider of systems development & deployment, targeting & intelligence analysis, systems engineering & integration, and training capabilities and solutions for the Intelligence Community, is seeking creative and dedicated professionals to fulfill their career goals and objectives while delivering mission excellence on programs of national importance.
We are seeking a highly motivated IT Security Administrator to join our National Intelligence Program supporting the operations, maintenance of a complex, hybrid on-premises and cloud enterprise IT environment. As an IT Security Administrator you will be responsible for implementing, administrating, and maintaining the organization's IT enterprise. This includes developing and implementing security policies and procedures, network management, conducting security assessments, and administering enterprise user and identity management
Job Responsibilities :
- Monitor, maintain, and configure enterprise networks and devices
- Develop and maintain the risk management framework
- Collaborate with stakeholders to define and implement security policies and controls
- Contribute to incident response planning and post-incident analysis
- Conduct regular security audits and vulnerability assessments
- Identify, prioritize, and address vulnerabilities, ensuring timely installation of security updates.
- Prepare risk reports and present findings to senior management
- Stay abreast of the latest network security trends, threats, and technologies
- Scan information systems using scanning tools such as Nessus, AppDetective, or others
- Create and update security documentation such as SOPs, internal process documents, and input into IT policies that support the continuous monitoring of accredited information systems
- Coordinate and manage the resolution of security incidents, providing root cause analysis and remediation strategies
- Coordinate with information system POCs for plan updates and mitigation strategies to ensure overall health of IT systems, networks and applications
- Manage and enforce user authentication, authorization, and role-based access control (RBAC)
- Review and monitor user access rights to ensure appropriate levels of access
- Develop continuous monitoring and plans of actions and milestones (POA&Ms)
- Develop ATOs following NIST guides and Risk Management Framework (RMF)
- Work closely with IT departments to ensure that security measures are integrated into the network and system design