The Internet is filled with cyber threats from hackers who want to steal corporate data and sell it on the black market. Security roles are more important than ever to sustain protection from these cyber threats. Security administrators are a company’s first step in defense and monitoring for suspicious activity either within the local network or from outside Internet traffic. Security administrators have a distinct skill from other IT administrators, which makes the job a stressful yet rewarding career.

Job Description: What Does a Security Administrator Do?

Security administration is a broad term for what applicants are expected to do. Most security administrators work in a team, so applicants could be responsible for any number of network tasks. These professionals are responsible for desktop, mobile, and network security. They perform risk assessment, audit machines and their software, train other staff on proper protocols, and monitor network traffic for any suspicious activity. They update software on the latest security patches, and ensure that each network resource has the proper defenses. They know cyber threats from experience and can even defend against zero-day malware.

Security Administrator Job Responsibilities and Duties

Once applicants understand the breadth of job responsibilities, they can understand what to focus on when applying for job opportunities. Each company requires a different skill set from its administrators, and most of them define job responsibilities before bringing applicants in for a technical interview. Depending on the size of the network, job applicants can expect to perform these tasks alone or within a team.

Job responsibilities and duties include:

  • Identify threats and work to create steps to defend against them
  • Perform vulnerability and penetration tests across all network segments
  • Monitor network traffic for suspicious behavior
  • Configure security systems such as firewalls, antivirus, and IDS/IPS software
  • Create network policies and authorization roles for file access
  • Analyze current security requirements and make suggestions for improvements
  • Define disaster recovery plans
  • Consult with staff, managers and executives on the best security practices