Search

Network and Security Administrator

companyFemwell Group Health
locationMiami, FL, USA
PublishedPublished: 6/14/2022
Full Time

Job Summary

Network and Security Administrator is responsible for designing, implementing, monitoring, and managing the local and wide area networks of an organization to ensure maximum uptime for users. Also, will plan, implement, upgrade, and monitor security protocols for the protection of the organizations computer networks and information. The role can include designing system configurations, documenting and managing the installation of a new network, and maintaining and upgrading existing systems as necessary.

Essential Job Functions

Duties/Responsibilities:

  • Designing and implementing new network solutions and/or improving the efficiency of current networks
  • Installing, configuring, and supporting network equipment including routers, proxy servers, switches, Firewalls, VPN, WAN accelerators, DNS and DHCP
  • Procuring network equipment and managing subcontractors involved with network installation
  • Configuring firewalls, VPN, routing, and switching to maximize network efficiency and security
  • Maximizing network performance through ongoing monitoring and troubleshooting
  • Arranging scheduled upgrades
  • Investigating faults in the network
  • Updating network equipment to the latest firmware releases
  • Working with vendor on pricing and ordering equipment for medical offices. Monitoring service agreement expiration dates.
  • Vulnerability Management - Maintains inventories and inventory processes of information resources protected by security regulations so vulnerability assessments can be performed. Uses tools and processes to effectively carry out vulnerability testing. Monitors and improves vulnerability management processes and procedures. Interprets scanning or testing results and provides consultation to network, workstation, systems, or web-applications administrators regarding system and application weaknesses. Appropriately escalates issues presenting unacceptable risk to the IT leadership. Monitors risk mitigation progress
  • Security Architecture, Consulting and Evaluation - develops security architecture components for newly proposed information systems and technologies using diagrams and narratives. Assists in materializing security architecture into projects. Develops and maintains and applies tools, processes and procedures to evaluate suitability of security configuration and feature offerings of proposed systems.
  • Information Security Risk Analysis - Develops, maintains and applies tools, methods and processes to analyze risk from threats to confidential information. Writes appropriate recommendations that will bring risks to an acceptable level. Develops and delivers audience appropriate information security assessment and recommendation presentations and reports. Establishes and maintains sound metrics to track and demonstrate information security improvement and risk management. Prepares risk assessment reports for technical and executive audiences
  • Security Incident Prevention, Detection and Handling - Develops, maintains, communicates and applies incident management policy, standards and procedures. Researches, evaluates, recommends, designs technical policies for and implements security technologies such as web content filtering systems, email filtering systems, end point protection systems, network firewall systems, intrusion prevention and detection systems (IDS/IPS), data loss protection (DLP) systems, security incident event management (SIEM) systems to prevent, detect and respond appropriately to threats to confidential information and information resources. Monitors security systems; recognizes anomalies of various systems, and handles or escalates appropriately. Writes professional and factual incident reports. Makes recommendations for recovery and prevention
  • Data Analysis - Analyzes security threat intelligence, tunes and calibrates security systems to improve effectiveness. Analyzes and correlates network dataflow logs, web logs, computer and application user activity logs, and security incident logs for information relevant to a real or potential information security or privacy breach or to support decision making and risk mitigation
  • Project Management - Lead discovery and information gathering sessions. Perform alternatives analysis documenting pros and cons, cost, feasibility, risk and other information to support a decision to select the best solution. Manage small to medium projects. Organize and facilitate meetings to identify and remove barriers, and to progress work.
  • Reporting network and security status to key stakeholders
  • Other network and security projects as assigned

Essential Required Competencies

Specific knowledge and skill-based competencies required to satisfactorily perform the functions of the job include:

  • An analytical mind
  • An ability to learn new technologies quickly
  • Good time management skills
  • An ability to follow processes
  • Strong documentation skills
  • Good communication skills both written and verbal
  • Commercial and business awareness

Education, Experience, Skills, and Requirements

  • Bachelors degree in computer or Information Science-related field required.
  • 5 years of experience working with Cisco, SonicWall, Fortinet, Ubiquiti devices, switches, firewalls, VPN and network appliances is required.
  • Configuration and Monitoring of firewall syslog processing experience required for security assessments and SOC reporting.
  • 3 years of experience working with Phone systems
  • 1-3 Years Cloud experience.
  • Knowledge of HIPAA Security preferred.
  • At least five years of related experience required.
  • Hybrid rotation schedule or onsite as per need basis
  • Travel to Data Center on a need basis is required.
Loading interface...
Loading interface...
Loading interface...
Loading interface...
Loading interface...
Loading interface...