What are the responsibilities and job description for the IT Security Administrator position at Jobs via Dice?
Dice is the leading career destination for tech experts at every stage of their careers. Our client, Mako Professionals, is seeking the following. Apply via Dice today!
Job Title: IT Security Administrator
Start Date: ASAP
Duration: Full-Time / Long-Term Opportunity
Location: Tampa, FL (Onsite 5 days/week initially, subject to review)
Type: Full-Time
Industry: Infrastructure / Public Sector
Overview
We are seeking an IT Security Administrator to support a highly secure, enterprise-scale environment operating 24/7/365. This role is responsible for protecting the confidentiality, integrity, and availability of systems, applications, and data across the organization.
The ideal candidate will bring hands-on experience in security operations, compliance frameworks, and incident response, with the ability to work across infrastructure and business teams to identify risks, implement controls, and continuously improve the organization's security posture.
Key Responsibilities
Security Governance & Compliance
Job Title: IT Security Administrator
Start Date: ASAP
Duration: Full-Time / Long-Term Opportunity
Location: Tampa, FL (Onsite 5 days/week initially, subject to review)
Type: Full-Time
Industry: Infrastructure / Public Sector
Overview
We are seeking an IT Security Administrator to support a highly secure, enterprise-scale environment operating 24/7/365. This role is responsible for protecting the confidentiality, integrity, and availability of systems, applications, and data across the organization.
The ideal candidate will bring hands-on experience in security operations, compliance frameworks, and incident response, with the ability to work across infrastructure and business teams to identify risks, implement controls, and continuously improve the organization's security posture.
Key Responsibilities
Security Governance & Compliance
- Perform gap assessments across security policies, regulatory requirements, and current practices
- Support compliance initiatives aligned to frameworks such as CJIS, SSAE-16, and ISO 27001
- Maintain security documentation, controls, and audit-ready evidence
- Track and manage remediation of compliance findings and security exceptions
- Partner with IT and business teams to prioritize and implement control improvements
- Monitor, investigate, and respond to security alerts, vulnerabilities, and potential threats
- Support incident response activities including containment, remediation, and reporting
- Analyze system logs, alerts, and endpoint telemetry for suspicious activity
- Participate in vulnerability assessments, threat modeling, and risk analysis
- Ensure systems, applications, and infrastructure are patched and aligned with security standards
- Administer and monitor security tools (e.g., endpoint protection, email security, firewalls, identity tools)
- Conduct routine security assessments and develop remediation plans
- Maintain application inventories and data flow documentation to support compliance efforts
- Support oversight of third-party vendors and external service providers from a security perspective
- Generate scheduled and ad-hoc security reports across multiple platforms
- Track compliance metrics, asset coverage, and control effectiveness
- Provide leadership with visibility into security posture, incidents, and remediation progress
- Support security awareness and training initiatives across the organization
- Collaborate with infrastructure, application, and business teams to address security gaps
- Provide guidance on secure configurations, controls, and best practices
- Assist in documenting and improving security processes and procedures
- 5 years of experience in IT security, cybersecurity, or related roles
- Strong understanding of cybersecurity principles, risk management, and security controls
- Experience working with compliance frameworks such as CJIS, SSAE-16, ISO 27001, or similar
- Hands-on experience with security operations including incident response and vulnerability management
- Familiarity with network security, identity and access management, endpoint protection, and logging/monitoring tools
- Experience analyzing logs, alerts, and security events across enterprise systems
- Ability to translate technical findings into business-level risk and impact
- Strong analytical, problem-solving, and communication skills
- Experience with security tools such as ESET, Proofpoint, Check Point, Active Administrator, or similar platforms
- Exposure to enterprise environments supporting regulatory or compliance-driven industries
- Experience with scripting or automation for security operations
- Familiarity with Windows and/or Linux environments
- Experience supporting vendor risk management and third-party security reviews