Unfortunately, this job is expired as of 10/23/2015.
To continue in your search through the appropriate job categories, click either Administrative Staff, Higher Education Executives, Faculty, Post-Doc and Graduate Assistants, . You can also utilize "guess-free" keyword search tools with up to eight pre-defined criteria. Search for and Apply to academic postings directly from the site. Post your background either confidentially or overtly. Stand out and be discovered!
Under the direction of the Information Security Officer (ISO) the IT Security Technician provides support of IT systems to faculty, staff, and student users through installing and maintaining client side security products. Audits, scans and secures systems in order to protect sensitive data. Assists the security team in maintaining, monitoring, auditing, and implementing the security for enterprise wide systems including but not limited to desktops. Documents and maintains technical procedures within various IT knowledgebases. Makes recommendations on security solutions to areas of campus and assists with implementation of those solutions.
Graduation from an accredited institution with a associate’s degree in Information Technology and three year of experience in Information Technology or equivalent education and experience related to the Summary of Duties totaling five years.
Knowledge and experience with information technology security issues and best practices.
Knowledge of current trends and developments in Information Technology.
Knowledge and experience with operating systems and protocols used with organizations. These include: Windows 7, XP, 2003 Server, Mac OSX, and Linux.
Knowledge of open source security tools like Nessus, Snort, Wireshark, and Nmap.
Knowledge of Malware, Antivirus, and host firewalls/IPS.
Skills in working with TCP/IP and application network protocol.
Ability to collaborate with others.
Ability to work in a team environment as a team player.
Ability to work independently with little supervision.
Please include any certifications you may have acquired that pertain to security and/or networking.
You were inactive for over twenty minutes. To protect you, we have logged you out. Any unsaved data has been lost.