Gathering your results ...
11 days
Not Specified
Not Specified
Not Specified
<p>Description</p> <p>POSITION TITLE:</p> <p>Supervisor, IT Systems & Security</p> <p>REPORTS TO:</p> <p>Manager, IT Systems & Security</p> <p>DIRECT REPORTS:</p> <p>Tech Security Analyst</p> <p>STATUS:</p> <p>Exempt</p> <p>DATE:</p> <p>August 2025</p> <p>LOCATION:</p> <p>Information Technology</p> <p>Position Summary:</p> <p>The IT Systems & Security Supervisor is responsible for overseeing the design, implementation, and maintenance of the organization's IT infrastructure and security protocols. This role ensures the integrity, confidentiality, and availability of systems and data while supervising the Tech Security Analyst and collaborating with cross-functional teams to align IT security initiatives with business objectives.</p> <p>Key Responsibilities:</p> <p>Leadership & Supervision</p> <ul> <li>Supervise and mentor the Tech Security Analyst, providing guidance, performance feedback, and professional development opportunities. </li><li>Coordinate workload distribution and ensure timely completion of security-related tasks and projects. </li><li>Foster a collaborative and security-conscious culture across the IT department. </li></ul> <p>Systems & Security Oversight</p> <ul> <li>Lead the planning, deployment, and monitoring of security measures to protect networks, systems, and data. </li><li>Oversee the identification, investigation, and resolution of security incidents and vulnerabilities. </li><li>Ensure compliance with industry standards and regulatory requirements including but not limited to PCI DSS. </li><li>Manage patching schedules, firewall configurations, and access controls across systems. </li><li>Evaluate and implement security tools, including encryption, anti-malware, and intrusion detection systems. </li></ul> <p>Strategic Planning & Project Management</p> <ul> <li>Align IT security initiatives with organizational goals and the broader IT strategic plan. </li><li>Lead or support security-related projects, ensuring milestones and deliverables are met. </li><li>Develop and maintain documentation for security policies, procedures, and system configurations. </li></ul> <p>Training & Awareness</p> <ul> <li>Promote security awareness across the organization through training and communication. </li><li>Ensure team members are informed of emerging threats and best practices. </li></ul> <p>Reporting & Documentation</p> <ul> <li>Review and approve incident reports, risk assessments, and audit findings. </li><li>Provide regular updates to leadership on system health, security posture, and project status. </li></ul> <p>Qualifications:</p> <p>Scheduling:</p> <ul> <li>Typically, Monday - Friday, 8:00 am - 5:00 pm. </li><li>May require working outside of normal hours including weekends and holidays. </li></ul> <p>Pre-Employment Requirements:</p> <ul> <li>Must pass pre-employment drug screening </li></ul> <p>Education & Certifications</p> <ul> <li>Bachelor's degree in Information Technology, Computer Science, or related field. </li><li>Relevant IT certifications (e.g., CompTIA Network+, CompTIA Security+, Azure AZ-900) preferred. </li><li>Equivalent work experience may be considered in lieu of formal education. </li></ul> <p>Experience</p> <ul> <li>Minimum 5 years of experience in IT systems and security, with at least 2 years in a supervisory or leadership role. </li><li>Strong understanding of network topologies, operating systems, and cloud environments. </li><li>Experience with firewalls, routers, switches, and endpoint protection tools. </li><li>Direct experience in cybersecurity operations, including threat detection, incident response, incident remediation, and vulnerability management. </li><li>Proven ability to implement and maintain security controls, conduct risk assessments, and ensure regulatory compliance. </li><li>Develop and deliver cybersecurity awareness training. </li></ul> <p>Desired Skills & Competencies</p> <ul> <li>Strong understanding of PCI-DSS framework. </li><li>Proficiency in managing Windows and Apple environments. </li><li>Experience with Active Directory, Group Policy, and identity/access management solutions. </li><li>Strong knowledge of TCP/IP, DNS, DHCP, VPN, and VLAN configurations. </li><li>Familiarity with Meraki and Verkada platforms. </li><li>Familiarity with Microsoft Entra ID, Microsoft Intune, Microsoft Defender, and Microsoft Purview. </li><li>Familiarity with endpoint detection and response (EDR) tools. </li><li>Hands-on experience with vulnerability scanning tools (e.g., Nessus, Qualys). </li><li>Understanding of cloud security principles (e.g., AWS, Azure, Google Cloud). </li><li>Experience with backup and disaster recovery solutions. </li><li>Excellent analytical, problem-solving, and decision-making skills. </li><li>Strong interpersonal and communication skills, with the ability to present technical information to non-technical audiences. </li><li>Proven ability to manage multiple priorities and projects effectively. </li><li>High level of integrity and commitment to confidentiality and data protection. </li></ul> <p>Working Conditions:</p> <ul> <li>Primarily office-based with occasional off-hours work for system maintenance or incident response. </li><li>Requires sitting for extended periods and occasional walking or standing. </li><li>Must be able to communicate effectively with diverse teams and stakeholders. </li><li>Direct contact with administrative staff and management. </li><li>Expected to behave professionally and adapt to a changing environment. </li><li>Excellent writing skills to document system and network configurations and User guides. </li><li>Limited job structure exists; situations are diverse, although not unique, require considerable creative and mental aptitude. </li><li>Works independently with minimal supervision. </li><li>Requires interpretative skills; a high degree of analysis using logical, evaluative or professional thinking is necessary to define problems, collect information, establish facts and form valid solutions. </li></ul> <p>Disclaimer:</p> <p>This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.</p>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!