Job Description
Systems Security Administrator
Requirements:
• Bachelor's (or equivalent) with 18+ years of experience or a master’s with 16+ years of experience
• Familiarity with Entrust products, including Two-Factor Authentication solutions, certificate management, and encryption technologies.
• Ability to collaborate effectively with cross-functional teams to integrate email systems with other applications and platforms.
• Excellent communication skills to provide technical support and guidance to end-users.
• Proven ability to multi-task
• Knowledge of best practices and IT operations in an always-up, always-available service
• Manages time effectively
• Creative thinking skills
• Detail-oriented personality
• Ability to maintain effective communication and working relationships with co-workers
Roles & Responsibilities:
• 2FA Implementation: Deploy and configure Two-Factor Authentication solutions for various systems, applications, and network resources to strengthen access controls and authentication mechanisms.
• User Management: Manage user profiles, authentication methods, enrollment processes, and access policies related to Two-Factor Authentication to ensure secure user access.
• Incident Response: Monitor 2FA logs, analyze authentication data, investigate suspicious activities, and respond to security incidents related to unauthorized access attempts or unusual authentication patterns.
• Certificate Lifecycle Management: Monitor certificate expiration dates, renewals, revocations, and updates to ensure continuous validity and security compliance.
• Monitor and maintain remote access solutions such as VPN, routers, and switches.
This individual will be responsible for performing the following activities:
• Administer USPS Two Factor authentication platform - ENTRUST
• Configure, administer, document policies for Remote access authentication
• Manage and troubleshoot Remote access solutions such as VPN and SDWAN
• High level troubleshooting of network and application issues as related to remote access
• Adhere to strict Information Systems security guidelines in all cases.