What are the responsibilities and job description for the Cyber Security Administrator position at Simply Driven Executive Search?
Please do NOT apply if you need the following:
- relocation assistance
- any type of sponsorship now or in the future
- not able to be onsite 5-days a week
The role is responsible for safeguarding the company’s Information Technology (IT) and Operational Technology (OT) environments from cyber threats. This onsite role involves implementing and maintaining security controls, monitoring networks, managing penetration tests and vulnerability assessments, investigating incidents, and ensuring compliance with cyber security policies and industry best practices. The administrator will work closely with IT, OT, and production teams to secure both office and manufacturing systems while minimizing operational disruption.
Key Responsibilities include:
- Administer and document Cyber Security Operations
- Monitor systems for suspicious activity, investigate potential threats, and report findings to IT management
- Collaborate with IT management to implement, document and test Incident Response & Recovery plans
- Develop and maintain cyber security policies, procedures and compliance documentation
- Organize and coordinate cyber security audits and assessments; oversee the resolution of identified issues and recommendations
- Perform system administration tasks
- Generate regular reports on the company’s cyber security status and protection efforts
Qualifications include:
- Bachelor’s degree in Cyber Security, Information Technology, Computer Science, or a related field (or equivalent work experience)
- 3 years of experience in cyber security or network/system administration
- Experience supporting both IT networks (servers, workstations, cloud services) and OT/industrial control systems (PLCs, SCADA, HMIs)
- Security-related certifications such as Security , CySA , CISSP, GICSP, or similar is a plus
- Knowledge of industrial cyber security standards, specifically NIST
Applicants should possess a strong understanding of networking protocols, firewalls, and segmentation strategies. They must have a familiarity with endpoint detection and response (EDR) solutions, SIEM platforms, and vulnerability scanners. Team players only with an understanding of sensitive security matters and confidentiality protocols.