It Administrator Jobs
By People Driven Technology, Inc At Farmington Hills, MI, United States
Manage software deployment and endpoint configuration policies
Maintain inventory and manage asset procurement
Keep up to date with technology advancements and best practices Qualifications
2+ years of MS 365 experience
Possess detailed planning and organizational skills
Working knowledge of Veeam for O365, Cisco Umbrella, WebEx Calling, and/or SentinelOne preferred
It Security Associate Jobs
By AAFCPAs At , Boston, Ma
Excellent analytical, organizational, and project management skills.
Proven time management and prioritization skills.
Experience with exceptional client service and communication skills with a demonstrated ability to develop and maintain outstanding client relationships.
One to two years of IT Security experience in a similar practice or function with a reputable firm.
Strong computer skills including proficiency in Microsoft Office Suite applications, Windows, Active Directory, and Linux.
Working knowledge of cloud hosting providers (e.g. Microsoft, Google, Amazon, Oracle) is a plus, but not required.

Are you looking for an exciting opportunity to join a dynamic team of IT Security professionals? We are seeking an experienced Associate IT Security Administrator to join our team and help ensure the security of our systems and data. You will be responsible for monitoring and responding to security threats, implementing security policies and procedures, and providing technical support to our users. If you have a passion for IT Security and are looking for a challenging and rewarding career, then this is the job for you!

Overview An Associate IT Security Administrator is responsible for the security of an organization’s information systems and networks. They are responsible for the implementation, maintenance, and monitoring of security measures to protect the organization’s data and systems from unauthorized access, modification, or destruction. Detailed Job Description The Associate IT Security Administrator is responsible for the day-to-day security of the organization’s information systems and networks. This includes the implementation, maintenance, and monitoring of security measures to protect the organization’s data and systems from unauthorized access, modification, or destruction. The Associate IT Security Administrator will also be responsible for developing and implementing security policies and procedures, as well as performing security audits and risk assessments. Job Skills Required
• Knowledge of computer security principles and practices
• Knowledge of network security principles and practices
• Knowledge of security protocols and encryption
• Knowledge of security software and hardware
• Knowledge of security best practices
• Knowledge of security compliance standards
• Ability to troubleshoot security issues
• Ability to analyze security logs
• Ability to identify security risks
• Ability to develop security policies and procedures
• Ability to communicate security risks and solutions
• Ability to work independently and as part of a team
Job Qualifications
• Bachelor’s degree in Computer Science, Information Technology, or a related field
• At least two years of experience in IT security
• Professional certifications such as CISSP, CISM, or CISA
Job Knowledge
• Knowledge of computer security principles and practices
• Knowledge of network security principles and practices
• Knowledge of security protocols and encryption
• Knowledge of security software and hardware
• Knowledge of security best practices
• Knowledge of security compliance standards
Job Experience
• At least two years of experience in IT security
• Experience with security audits and risk assessments
• Experience with security policies and procedures
Job Responsibilities
• Implement, maintain, and monitor security measures to protect the organization’s data and systems from unauthorized access, modification, or destruction
• Develop and implement security policies and procedures
• Perform security audits and risk assessments
• Troubleshoot security issues
• Analyze security logs
• Identify security risks
• Communicate security risks and solutions
• Work independently and as part of a team