Information Security Technician
[Intro Paragraph] The purpose of the introductory paragraph for your information security technician job description is to catch potential candidates’ attention, and ultimately apply for the position. Highlight the best characteristics of your business, including prime location, potential for employee growth, management style, and overall company culture.
An employer’s brand image also plays and key role in whether today’s jobseekers decide to work for a company. That means employers in search of the best information security technicians must clearly communicate their organization’s mission, goals, values, and the customers you serve. Be sure to include any community involvement initiatives and social causes your business supports.
Also, the introduction to your information security technician job description should touch on the business’s competitive advantage, industry awards, favorable customer ratings, and relevant employee satisfaction survey results, which increase your chances of getting noticed by top talent.
Information Security Technician Requirements and Responsibilities:
- Maintain network security by regularly monitoring all access points and providing vulnerability reports to management.
- Issue IDs and monitor access; assist clients with password creation and usage.
- Audit access throughout systems/applications and ensure access is at appropriate levels.
- Analyze systems, security controls, and event logs to detect nefarious activity.
- Build documentation of existing processes and exceptions based on audit findings.
- Collaborate with team engineers and architects to ensure security of new projects.
- Audit the company’s security controls to ensure they are working correctly.
- Take advantage of educational opportunities to keep job knowledge updated.
- Work with multiple stakeholders (internal and external) to assess and identify security compliance gaps and propose technical and operational remediation solutions.
- Install CCTV, Access Control, and Intrusion hardware cabling and other forms of cabling as technology continues to evolve.
- Help with testing of installed equipment and provide basic programming, such as, adding card readers, cameras and alarm points to any system.
- Assist in performing preventive maintenance and repair.
[Work Hours & Benefits]
Most information security professionals work full time and can be found in both the public and private sector. It’s not uncommon for information security technicians to be on call outside of normal business hours in case of an emergency, or to remediate problems and make updates to systems that employees use during the workday.
Some work more than 40 hours per week, with those working for consulting firms required to travel to client locations to deliver their services as needed. Whatever your business requirements, the information security technician job description should call out special scheduling requirements. Transparency early in the recruitment process will weed out applicants for whom those work hours aren’t a fit.
Geographic region, industry, and years of experience all factor into the information security technician salary and benefits. Consulting websites like the U.S. Bureau of Labor Statistics or other pay scale indexes can help you determine what to offer to remain competitive. In general, expect to offer traditional benefits like group health insurance, paid time off (PTO), and 401(k) plans. If you’re in a tight labor market, consider increasing your company’s appeal by offering the following incentives:
- Signing bonuses
- Education reimbursement
- Productivity bonuses (quarterly, bi-annually, or annually)
- Paid time off for community service participation
- Pre-tax transportation, healthcare, or childcare reimbursement accounts
Information / Cyber Security Technician Skills and Qualifications:
Top information security technicians possess well-honed problem-solving skills and are capable of finding and troubleshooting basic and complex cloud-based, network, hardware, and software related issues. Some companies require information security technicians to handle related physical tasks like installing and troubleshooting desktop and laptop computers, servers, peripheral equipment, and cabling.
In addition to their technical knowledge and aptitude, information security technicians should exhibit key soft skills like above-average communication skills, customer service skills, and a desire to continuously learn and stay abreast of the ever-changing technology landscape. They’re used to reporting progress to business owners or the executive team. Here are standard qualifications and skills to list as part of your information security technician job description:
- Ability to work on call as needed
- Experience with firewall administration and network security
- Knowledge of research techniques and information security policies
- Accurate attention to detail and thorough organization skills
- Ability to work independently and resolve issues
- Familiarity with hubs, routers, and switches
- Strong background in network security, computer systems, and the information security landscape
- Ability to lift up to 50 pounds
- Capable of frequent prolonged periods of standing, bending, pulling, twisting, reaching, climbing, and standing.
- Detail-oriented, with superb organizational and clerical skills
Education & Experience Requirements:
- Bachelor’s Degree in Computer Science or MCSE with network security and disaster recovery experience
- 2-5 years of security administration, including SAP
- 2-5 years of network administration and/or disaster recovery experience
- Working knowledge of Microsoft operating systems and Active Directory.
- SAP GRC administration a plus
- Certified Information Systems Security Professional (CISSP) certification strongly preferred
- Microsoft Certified System Engineer preferred
- Certified Information Systems Security Professional
[Call to Action] Use the end of the information security technician job description to tell applicants what’s next. Most importantly, provide clear instructions on how to apply for the position.
Use Your Information Security Technician Job Description to Attract Top Talent
Once you’ve crafted a clear, specific, concise job description, we can provide a fast and easy way to start your search and find the best applicants for your information security technician position. Find out how to post your job listing for free and attract the best candidates on Monster.