Categories
IT Infrastructure Job Descriptions

Security Administrator: Job Description

Use our template to create a compelling and comprehensive Security Administrator job description to attract top talent.

The role of the Security Administrator is to implement the security policies that have been previously defined by the CISO. They are also in charge of ensuring the respect and good use of the computer system and dealing with any potential security breach.

Let’s delve into details with this Security Administrator job description.

Security Administrator, the job description

Above all, what are the main tasks of a Security Administrator?

The following are specifics of the three main tasks a Security Administrator faces in their work.

Implementation of the information security policy

Accordingly with the information security policy defined by the CIO, the security administrator is responsible for its proper implementation. This involves facilitating the process of information circulation and control, establishing a charter, and usage rules.

IT monitoring and security

Cybercrime threats are constantly increasing and new dangers appear regularly that the security engineer must address. To do so, they must have sufficient knowledge of the various software and other methods used by hackers.

Employee awareness

So as seen above, the implementation of a security policy includes the development of usage rules. These will be addressed to users and must therefore be sufficiently clear so that the company’s information security issues are understood by all.

Required skills of the Security Administrator

But, what does it take to be a Security Administrator? Here you find all the required skills for this professional profile.

Rigor

Security issues require rigor at all times! Under these conditions, the Security Administrator Engineer cannot afford to let certain weaknesses and flaws go unnoticed.

Anticipation and availability

System security also requires good anticipation of potential flaws or problems in order to ensure the continuous availability of information systems to users.

Good communication skills

As the person in charge of implementing the security policy, they must inform the various users as clearly as possible of the different rules to be respected in order to avoid any security problems.

Context

As IT security is becoming a major issue within companies, finding the right security experts has become a major challenge. 80% of European companies have been attacked at least once by cyber criminals.

Salary expectation of the Security Administrator

The average salary range for a Security Administrator is between €46,022 and €74,512 yearly.

If you are interested in new IT challenges and want to apply for the role of Security Administrator, visit Mindquest IT job search platform.

Find your next IT job with Mindquest
Categories
Cybersecurity Tech Magazine

10 of the Best Cybersecurity Experts in the Netherlands to Follow Online

Certainly, information security only keeps gaining importance as more and more business-critical processes move to the cloud and hackers get more sophisticated. For this reason, you should stay up-to-date with best practices, top threats and emerging trends. That is why we at Mindquest suggest you 10 of the best cybersecurity experts in the Netherlands to follow on LinkedIn and Twitter. 

Also disover our article: 10 of the Best Software Developers in the UK to Follow Online

10 of the Best Cybersecurity Experts in the Netherlands to Follow Online

Cybersecurity has become crucial in recent times, especially during the Covid-19 pandemic. As more and more companies had to implement their own virtual work environment, the need for cybersecurity experts grew exponentially. At Mindquest, as IT talents experts, we know the importance of getting the right contact to stay up-to-date and always match the top candidate for the best IT positions.

Therefore, take note of the 10 best Cybersecurity experts in Netherland to follow online.

Chantal Stekelenburg 

LinkedIn | Twitter 

Firstly, Chantal is head of Hackers at continuous security platform Zerocopter and also a co-founder and organiser of the Netherlands’ Women In Cybersecurity Community Association.  

Oscar Koeroo 

LinkedIn | Twitter 

Oscar is currently leveraging his expertise as a Docent at Security Academy, where he imparts knowledge on Applied Cryptography.  

Sanne Maasakkers 

LinkedIn | Twitter 

Also, Sanne has recently joined Mandiant, now a part of Google Cloud, as a Senior Analyst. In this role, Sanne brings her expertise in cybersecurity to the forefront, contributing to Mandiant’s mission of providing cutting-edge security solutions.

Astrid Oosenbrug 

LinkedInTwitter  

Astrid is currently serving as the Corporate Social Responsibility Officer at ESET Nederland. In this role, she focuses on measuring the impact of the organization’s activities on society and the environment, promoting transparency and ethical behavior to contribute to sustainable development. 

Floor Terra 

LinkedIn | Twitter  

Floor is a senior privacy advisor at data protection services Privacy Company He also specialises in high-impact projects combining technological and organisational solutions. 

Connect by Mindquest- Newsletter

Joost Schellevis 

LinkedIn|Twitter  

Joost is a tech editor at Dutch news organisation NOS. He writes about security and privacy issues and also reports on the country’s latest cybersecurity news. 

Marjolijn Bonthuis 

LinkedIn | Twitter  

Marjolijn is deputy director at ECP, a public-private platform for the development of the information society. She is also the winner of Women in Cyber Security (WiCS)’s 2016 Woman of the Year Award. 

Lodewijk van Zwieten 

LinkedIn | Twitter 

So, Lodewijk is a senior public prosecutor at the Dutch Public Prosecution Service specialising in combating cybercrime. He is also part of the supervisory board at the DIVD. 

Anna van der Leeuw 

LinkedIn | Twitter 

Then, Anna is a privacy law expert at firm Allen & Overy, where she focuses on European Union regulations around ICT & Telecom, data protection and cybersecurity. 

Rickey Gevers 

LinkedIn | Twitter 

Last but not least, Rickey works as Incident Responder at Responders.NU. Founded with the mission to elevate Incident Response to new heights, the company breaks away from traditional approaches to deliver unparalleled expertise and service.

Categories
DSI challenges IT Decision-makers

Finding security experts in the COVID-19 crisis: a major challenge for IT departments

How to find the good security experts? About a third of the world’s population is estimated to be currently under confinement to stop the spread of the novel coronavirus. As a result, businesses across the globe are resorting to remote work to continue operations in those areas where that is possible. This is adding unprecedented amounts of stress to already understaffed IT departments. 

CIOs and other IT leaders find themselves racing against the clock to adapt the whole company’s infrastructure to a work-from-home scenario while tackling their biggest concern: cybersecurity. And for good reason – threats are increasing exponentially. 

But assembling the right security experts & security team is proving even more difficult than it usually is already. 

Security threats give no quarter  

Hackers are certainly not going to close shop because of a tiny microorganism. If anything, they are using it to their benefit. For instance; phishing emails; were already the most common form of attack experienced by organisations. But the past days have seen a great surge in attacks trying to lure employees into clicking on an email sent by “their boss” or containing virus-related information.  

Among the most reprehensible of attacks are those being experienced by health and medical institutions. Not even the World Health Organisation was spared, targeted earlier last month by a false-domain attack aimed at stealing passwords from agency staffers. The situation is so dire that a group of 400 security experts from international giants like Microsoft and Amazon has volunteered to fight hacking tied to the coronavirus.  

Yet that is not the main issue. The pressure being put on enterprise networks is quickly revealing system vulnerabilities. And especially for those companies least used to distributed work and that rely too much on local networks. In short, the soaring numbers of employees working from home are finally making most decision-makers aware of what IT leaders have been warning us for a while. The business world’s generalised lack of a comprehensive security policy and employee awareness training.    

Although effective measures like VPNs have gained adoption in recent years, problems generated by shadow IT and BYOD remain largely unresolved. Many staffers will be accessing company resources through their personal devices and networks in the coming weeks. Multiplying exponentially the potential points of entry for attackers.  

Experts are becoming even harder to find 

In turn, this increase in cyberthreats is exacerbating the skill and personnel shortages the security sector was already experiencing. According to a recent study by ISC, the global security industry lacks more than 4 million security professionals. The world’s security workforce would need to grow 145% yearly just to meet the demand for skilled talent.  

The shortage of skills impacts some of the most critical roles within IT security. Such as those related to identifying threats or patching and updating vulnerable systems. However, the deficit is more acute in areas tied to rapidly emerging or evolving technologies. For instance, and in this WFH crisis more than ever, security in multi-cloud environments is key. Unfortunately, few organisations have dedicated cloud security experts or proper encryption protocols for their data in the cloud.   

Not surprisingly, the cost of security expertise has also become a problem as the lack of skilled talent drives wages up. And so the vicious circle goes.   

Hire or outsource? 

With everyone battling over the same security experts. Defining a solid talent strategy and identifying the right partners can make the difference; between a multi-million breach and your department’s success.  

Regarding your talent strategy, you first need to decide whether you want to expand your team or rely on the temporary help of consultants. If you had been planning on bringing more people on board for some time, this might be the perfect time to create new permanent positions or fill vacant ones.  

On the other hand, calling on a freelancer will most likely allow you to speed up the selection process and provide a quicker response to the crisis. Working with an independent contractor can also help you secure exactly the skills you need at a more competitive cost. As the freelance talent market tends to be more agile and flexible. 

No matter which option you are leaning towards, don’t hesitate to seek the guidance and help of talent experts. Time is of the essence in the cybersecurity wars. Partnering up with the right IT staffing specialists will not only allow you to access the best talent; it will help you secure it before another company closes the deal.  

Need Extra IT Support? Avoid Mistakes When Hiring Tech Freelancers


Join our community and find your next job or expert in IT