DE Jobs

Search from over 2 Million Available Jobs, No Extra Steps, No Extra Forms, Just DirectEmployers

Job Information

Storey County Network Security Administrator in Virginia City, Nevada

Job Summary

Under general supervision of the IT Director, is responsible for performing professional level duties related to the administration of network and technology infrastructure security for County systems to include configuration and installation of new equipment and monitoring for performance optimization. Implements, maintains, programs, monitors, and troubleshoots cybersecurity and electronic security systems for the County; works with customers and outside vendors to analyze needs and to prepare system specifications and design plans for implementation of these technologies; and performs related work as required.

Distinguishing Characterisitcs

This is an advanced professional level position in the Information Technology Department. The incumbent exercises a high degree of independence and leadership, assuming added responsibility, working independently, rapidly prioritizing, communicating, executing multiple tasks, meeting demanding deadlines. An employee at this level receives minimal instruction or assistance when new or unusual situations arise and is fully aware of the operating procedures and policies of the work unit.

Essential Functions

The duties listed below are examples of the work typically performed by an employee in this position. Performance of these functions is the reason the job exists. An employee may not be assigned all duties listed and may be assigned duties which are not listed below.

  1. Reads and creates network documentation for County systems.
  2. Designs and implements networks, utilizing extensive knowledge of TCP/IP and other networking protocols, including but not limited to sub-netting, DHCP, static IP addressing.
  3. Configures, maintains, and deploys Cisco routers, security appliances, switches, and firewalls.
  4. Manages multiple servers in multiple networks including management of permissions and server maintenance; utilizes Microsoft Active Directory and related services; and performs services related to current versions of Windows servers.
  5. Performs administrative level tasks in Microsoft Office 365 and Azure including account synchronization, policy setting, email flow troubleshooting, and report generation.
  6. Oversees management of email SPAM filters.
  7. Responsible for securing hardware devices and software packages including but not limited to those from Microsoft, VMWare, Barracuda, HP, Palo Alto, mobile devices, mobile computing.
  8. Monitors and maintains security logging systems, including Arctic Wolf, Windows servers, firewalls, switches, routers, and log collectors.
  9. Oversees security practices for systems such as internal and external DNS, IIS, .NET Framework, and SQL server and configures, supports and troubleshoots issues related to these technologies.
  10. Develops end-user training on security topics.
  11. Analyzes organization's work and data and document flow; develops, recommends, and implements appropriate use of current and future security technologies to improve and optimize work and data flow.
  12. Responds to inquiries concerning security systems operation and diagnoses security system hardware and software.
  13. Installs, configures, maintains, and secures network hardware consisting of servers, routers, switches, wireless devices, and firewalls.

Secondary Functions

During emergencies may respond to call-out in emergencies, other than normal working hours, as needed. For example, may respond to and actively participate and serve in an influential and leadership role in all-hazard Incident Command Systems (ICS); provide assistance in the integration of facilities, equipment, personnel, procedures, and communications operating within a common organization ICS structure; assist and lead in coordinating responses among various jurisdictions and functional agencies, both public and private; and assist and lead in establishing common processes for planning and managing resources in the ICS; may assist departments on the r emergency management and ICS plans.

Qualifications

Knowledge of

  • Network security software and SPAM filtering
  • Advanced TCP/IP and routing protocols
  • Operation and management of Office 365 Suite and Azure/Entra
  • Operational characteristics offirewalls, routers, switchingand server class and personal computer systems.
  • Operational characteristics of various computer programs and software packages including VMWare, Palo-Alto, Microsoft, and HP.
  • Organizational security regulations, policies, and procedures.
  • Correct English usage including grammar, punctuation, and vocabulary.
  • Security administration/disaster recovery principles and practices.
  • Monitoring, tracking and documenting network changes.
  • Concepts of data confidentiality, integrity, and availability.
  • Malware, backup and recovery, and encryption.
  • Operating system environments.
  • Security risks and controls.
  • System platforms and inter-operability.
  • Initialization, operation, backup, and restoration procedures.
  • Record keeping principles and practices.

Ability to

  • Develop and implement software and hardware to improve security within the organization systems.
  • Work independently with minimal supervision.
  • Implement and update network security measures on a regular basis.
  • Plan and prepare technical reports, memoranda, and instructional manuals as documentation of program development.
  • Communicate effectively both orally and in writing.
  • Upgrade network systems and correct errors to maintain system after implementation.
  • Maintain confidentiality.
  • Establish and maintain effective working relationships with those contacted in the course of work.
  • Develop and implement security programs/technology.
  • Implement business recovery methods and procedures.
  • Work with users and information technology staff to troubleshoot and resolve security problems.
  • Interpret technical reference materials in troubleshooting problems.
  • Provide Network Security Monitoring and technical oversight for critical systems specific to meeting compliance standards by employing processes for implementing security measures to IT assets.
  • Develop, plans, implement, and maintain layered cyber security architecture for the organization, to include duties such as resource planning, research and development, and incident handling resolution.
  • Responsible for leading, scheduling, and/or performing security reviews, security audits, vulnerability scans, log reviews, and risk analysis.
  • Maintain Cyber Security Incident Response Plan.

Licensing, Education, and Other Requirements

  • Any combination of training, education, and experience that would provide the required knowledge and abilities. A typical way to gain the required knowledge and ability is:
    • Bachelor's degree in computer science, information systems, cyber security, or related field; or
    • Four years of experience relevant to the duties of the position which include computer operations, systems administration, network administration, and/or information security.

```{=html}

``` - Must possess and maintain a valid Nevada Class C Drivers License. - Must successfully pass a criminal background investigation. - Must obtain Criminal Justice Information System Level 4 certification within 1 month of hire. - Must have CCNA or equivalent experience.

Physical Requirements and Working Environment

The conditions and requirements descri

DirectEmployers