Demo

IT Security Administrator

Marion County
Salem, OR Full Time
POSTED ON 2/10/2025
AVAILABLE BEFORE 4/9/2025
This recruitment has been reopened for additional applicants and will remain open until filled. If you have already applied for recruitment #560-2025-1, you do not need to reapply. New applicants are encouraged to submit applications as soon as possible as this recruitment may close at any time without further notice.

Information Technology (IT) provides technical services, manages the county's technical resources, and provides consulting services for technology improvements through three programs: Administration, Operations, and Technology Solutions. These programs provide a complete range of technology services, which include strategic planning, new service design, business analysis, project management, security risk management, data security, applications delivery and support networks, servers and storage, desktop and mobile management, database administration, and end-user support through the service desk.

GENERAL STATEMENT OF DUTIES

Plan, organize, manage, and administer information security, operations, and functions; develop and implement program and strategic planning; implement and assist in the development of information security program policies, procedures, and business practices; evaluate goals, objectives, priorities, and activities to improve performance and outcomes; recommend and establish administrative controls and improvements; develop procedures to implement new and changing regulatory requirements; serve as an advisor to the management team.


SUPERVISION RECEIVED

Under general supervision of the IT Director, who assigns work, establishes goals, and reviews the results obtained for overall effectiveness through analyzing work products, observations, and meetings.


SUPERVISION EXERCISED

Full supervision, including employee selection and training, performance evaluation, complaint response, and personnel recommendations.


DISTINGUISHING CHARACTERISTICS

Develop and maintain the framework for the organization's IT information security. Evaluate and recommend new information security technologies and countermeasures against threats to information or privacy. Identify information technology security initiatives and standards for the enterprise. Manage the development, implementation, and maintenance of information security policy, standards, guidelines, and procedures. Set the access and authorization controls for everyday operations and emergency procedures for data. Set the standards for access controls, audit trails, event reporting, encryption, and integrity controls. Keep abreast of the latest security and legislation, regulations, advisories, alerts, and vulnerabilities about IT assets.

 Monitor and maintain security tools/systems (not limited to)
  • Endpoint Threat Protection Monitoring (Devices with Antivirus)
  • Cloud Security Monitoring, alerts & reports
  • Advanced Threat Protection (ATP)
  • SIEM or other logging and correlation technologies
  • Vulnerability Scans for security and compliance 
  • Vulnerability remediation assessment and planning  
Implement new security configurations
  • Research security configuration enhancements and make recommendations to management
 Security Risk and Prevention
  • Monitor data access: ensure the internal control systems are monitored and that appropriate access levels are maintained following the principle of least privilege.
  • Conduct security assessments through vulnerability testing and risk analysis using available vulnerability scanning tools.
  • Assist with internal and external security audits.
  • Ensure adopted security policies, procedures, and best practices are followed.
  • Contribute to weekly security status reports to IT leadership
 Security Incident and Authoritative Contact
  • Analyze security breaches to identify the root cause.
  • Respond to potential security policy violations or complaints from external parties. 
  • Assist in oversight and activities for intrusion detection and response. 
  • Investigate security incidents and develop after-action reports. 
  • Serve as a point of contact for external security auditors, survey requests, and for department security/privacy matters. 
  • Assists in facilitating and promoting activities to create information security awareness and training.
  • Other duties as assigned. 
EXPERIENCE AND TRAINING
  1. Bachelor's degree in computer science, information technology, or related field; AND
  2. Five years of progressive experience in computing, information security, and internet technology, including two years of supervisory experience; OR
  3. Any satisfactory combination of work, education, training, or experience relevant to the position, as determined by Marion County.

SPECIAL REQUIREMENTS 
  • The finalist for this position will be required to pass a criminal history background check, including finger printing; however, conviction of a crime may not necessarily disqualify an individual for this position.
  • Must possess a current driver's license in the applicant's state of residence and an acceptable driving history. Marion County will obtain a copy of the driving record for all qualified applicants from Driver and Motor Vehicle Services and review the driving record according to the Marion County policy and procedure for Driving on County Business. The policy can be found at: http://apps.co.marion.or.us/APAP/.
  • This assignment is represented by a union.
  • This is a full-time position, which is eligible for overtime.
  • Typical Work Schedule:  Monday through Friday, 8:00 A.M. - 5:00 P.M., with flexibility depending upon the needs of the department and program.
  • Must be available to perform assigned rotating after-hour duties.
     

PREFERENCES
  • Certified Information Systems Security Professional (CISSP), or formal security certifications from International Information System Security Certification Consortium (ISC)², Global Information Assurance Certification (GIAC), Computing Technology Industry Association (CompTIA), Information Systems Audit and Control Association (ISACA).
  • Information security principles and practices, including any of the following: security risk assessment standards, risk assessment methodologies, and vulnerability assessments.
  • Senior level knowledge of mainstream operating systems and a wide range of security technologies, such as network security appliances, identity and access management (IAM) systems, anti-malware solutions, automated policy compliance tools, and desktop security software.
 
KNOWLEDGE, SKILLS, AND ABILITIES
Knowledge of technology hardware and software which includes, but is not limited to systems, application languages, server based systems, cloud computing, personal computers, local and wide area network configurations and management, information and data management software and state-of-the-art system development and maintenance technologies; local, state, and federal laws, rules, policies, and regulations affecting information security and related technology and systems; strategic planning, preparation, and projection; and effective leadership and organizational communication principles and practices. Working knowledge of prevailing industry security standards and common body of knowledge gained by way of CISSP, SANS, or CISA Certifications.

Skills and abilities to manage and oversee comprehensive information security; lead diverse technologies, employees, and customer groups; communicate effectively in writing and orally, including the ability to make public or staff presentations; establish and maintain effective working relationships with a variety of individuals and groups, including customers in high-stress situations; and assist in confidential investigations. Skill in identifying information security problem areas, formulating diagnoses, and proposing practical solutions. Deep understanding of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts. Ability to establish and maintain effective working relationships with employees, systems users, outside consultants, and vendors.

PHYSICAL REQUIREMENTS
Sees using depth perception; stands; sits; moves about the work area; bends forward; stoops; climbs 1 floor of stairs; crawls; reaches overhead; lifts up to 40 lbs.; pushes, pulls, and carries up to 25 lbs.; moves carts weighing up to 100 lbs.; operates a keyboard; speaks clearly and audibly; reads a 12 pt. font; distinguishes colors and shades; hears a normal level of speech; and works in areas that may be exposed to dust.

Salary : $50 - $67

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a IT Security Administrator?

Sign up to receive alerts about other jobs on the IT Security Administrator career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$86,628 - $131,378
Income Estimation: 
$123,246 - $161,441
Income Estimation: 
$194,072 - $240,547
Income Estimation: 
$220,784 - $286,649
Income Estimation: 
$111,725 - $147,313
Income Estimation: 
$139,945 - $168,577
Income Estimation: 
$140,233 - $181,029
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$135,994 - $168,063
Income Estimation: 
$220,784 - $286,649
Income Estimation: 
$152,549 - $188,894
Income Estimation: 
$194,072 - $240,547
Income Estimation: 
$135,994 - $168,063
Income Estimation: 
$161,209 - $233,553

Sign up to receive alerts about other jobs with skills like those required for the IT Security Administrator.

Click the checkbox next to the jobs that you are interested in.

  • SAP Asap Methodology Skill

    • Income Estimation: $152,066 - $200,383
    • Income Estimation: $160,866 - $213,122
  • Business Analytics Skill

    • Income Estimation: $116,096 - $159,317
    • Income Estimation: $124,087 - $161,899
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Marion County

Marion County
Hired Organization Address Salem, OR Full Time
This recruitment has been reopened for additional applicants and will remain open until filled. If you have already appl...
Marion County
Hired Organization Address Salem, OR Full Time
This recruitment has been reopened for additional applicants and will remain open until filled. If you have already appl...
Marion County
Hired Organization Address Salem, OR Full Time
Marion County is recruiting a Labor and Employee Relations Manager to join our team. If you are passionate about employe...
Marion County
Hired Organization Address Salem, OR Full Time
This recruitment has been reopened for additional applicants and will remain open until filled. If you have already appl...

Not the job you're looking for? Here are some other IT Security Administrator jobs in the Salem, OR area that may be a better fit.

IT Administrator - Network

Marion County, Salem, OR

Network IT Administrator

Robert Half, Salem, OR

AI Assistant is available now!

Feel free to start your new journey!