Security Administrator

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Security Administrator with a 9-month contract in Carson City, NV, offering $40-55/hour. Key skills include SIEM configuration, scripting (Python, PowerShell), and risk compliance. A bachelor's degree in IT or Cybersecurity is preferred.
🌎 - Country
United States
πŸ’± - Currency
$ USD
-
πŸ’° - Day rate
440
-
πŸ—“οΈ - Date discovered
August 30, 2025
πŸ•’ - Project duration
More than 6 months
-
🏝️ - Location type
On-site
-
πŸ“„ - Contract type
W2 Contractor
-
πŸ”’ - Security clearance
Unknown
-
πŸ“ - Location detailed
Carson City, NV
-
🧠 - Skills detailed
#Python #Oracle #SQL (Structured Query Language) #Scripting #Visualization #Logging #Computer Science #Documentation #Cybersecurity #SQL Server #DBA (Database Administrator) #PCI (Payment Card Industry) #Scala #Automation #Security #Compliance #Alation #Linux #Logstash #Firewalls #Data Processing
Role description
Job Title: Security Administrator 4 Duration: 09 Months (With the possibility of extension) Location: Carson City; Nevada 89706- Onsite Pay Rate: $40-55/ Hour on w2 without any benefits. β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’ NO C2C β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’ Job Description : RESPONSIBILITIES β€’ Documentation and Runbook Development o Develop and maintain detailed documentation and playbooks for daily, weekly, and monthly information security operations, including incident response procedures and system maintenance tasks. o Create and update checklists for operational tasks, such as patch management, vulnerability scans, and access control reviews. o Format and standardize information security policies, procedures, and guidelines for clarity and accessibility. β€’ Logging and Alert Configuration o Configure logging mechanisms for security tools (e.g., Graylog, NXLog, Logstash FortiAnalyzer) to capture relevant security events and system activities. o Set up and fine-tune alert rules for real-time detection of security incidents, such as unauthorized access attempts or anomalous network traffic. o Monitor and validate log integrity and retention policies to ensure compliance with organizational and regulatory requirements. β€’ Creating Automations and Workflows o Develop automated scripts (e.g., using Python or PowerShell) to streamline repetitive security tasks, such as log analysis, vulnerability scanning, and report generation. o Create workflows to automate incident response processes, including ticket creation, escalation, and notification for security events. o Integrate automation tools with existing security platforms (e.g., SIEM, ticketing systems) to improve operational efficiency and reduce response times. β€’ Risk and Compliance Support o Collect and organize data for risk assessments, including asset inventories, vulnerability scan results, and threat intelligence feeds. o Support compliance audits by preparing documentation and evidence for frameworks like IRS Publication 1075 and PCI DSS. o Track and report on remediation efforts for identified vulnerabilities and compliance gaps. β€’ Data Reporting and Metrics o Collect and analyze data from security tools (e.g., firewalls, IDS/IPS, endpoint protection platforms) to generate metrics on vulnerabilities, incidents, and system performance. o Develop automated scripts (e.g., using Python or PowerShell) to streamline data collection and reporting processes. β€’ Operational Support: o Assist in the execution of operational tasks, such as user access reviews, security patch verification, and backup validation. o Support the ISO in coordinating incident response drills and tabletop exercises. o Perform additional tasks as directed to support information security initiatives. DELIVERABLES Modernization Project Deliverables β€’ Implementation Plans β€’ Scope Management Plans β€’ Project Communications Plan β€’ Activity List β€’ Risk Management Plan Education β€’ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or a related field preferred. Technical Skills β€’ Strong working knowledge of computer networks, Windows, and Linux. β€’ Proficiency in configuring and managing SIEM tools. β€’ Experience with scripting languages (e.g., Python, PowerShell) for automation and data processing. β€’ Familiarity with security tools, such as firewalls, IDS/IPS, endpoint detection and response EDR), and vulnerability scanners (e.g., Nessus). β€’ Experience as a database administrator (Oracle/SQL Server/Postgres) a plus. Soft Skills β€’ Strong attention to detail and documentation skills. β€’ Ability to communicate technical concepts clearly to non-technical stakeholders. β€’ Strong organizational and time-management skills. Preferred Knowledge β€’ Understanding of information security frameworks (e.g., NIST, CIS). β€’ Familiarity with compliance requirements (IRS Pub 1075, PCI DSS). β€’ Experience with data visualization tools (Excel). Certifications (preferred but not required) β€’ CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent.