Want to get hired at Jobs via Dice?
Security Administrator
Jobs via Dice
HybridHybrid
Original Job Summary
About the Role
The Security Administrator role at Security Administrator is with PROLIM Global Corporation via Jobs via Dice. The ideal candidate is responsible for ensuring secure configuration, integration, and management of systems and infrastructure. This position requires a strong knowledge of system configuration, risk assessment and incident response, cloud environments, and collaboration with technical and business teams.
Responsibilities
- Configure and administer secure systems aligned with requirements.
- Implement and manage security architecture, protocols, and best practices.
- Support system integration and migration across environments.
- Conduct risk assessments, identify vulnerabilities, and apply mitigation strategies.
- Ensure regulatory compliance and adherence to security standards.
Qualifications
- 5+ years of experience in system administration, integration & migration, security architecture, risk assessment, and compliance.
- Strong expertise in system configuration and migration.
- Knowledge of cloud/infrastructure environments and security protocols.
- Familiarity with data security protocols, encryption, and access control.
- Understanding of compliance standards such as SOX, GDPR, ITAR.
Key Skills/Competency
- Security Administration
- System Configuration
- Risk Assessment
- Incident Response
- Integration
- Cloud Security
- Compliance
- Migration
- Security Architecture
- Protocol Management
How to Get Hired at Jobs via Dice
🎯 Tips for Getting Hired
- Research PROLIM Global Corporation: Understand their security and compliance standards.
- Tailor your resume: Highlight relevant experience and skills.
- Network actively: Connect with current employees on LinkedIn.
- Prepare technical details: Be ready to discuss system configuration and risk assessments.
📝 Interview Preparation Advice
Technical Preparation
circle
Review system configuration best practices.
circle
Study cloud security protocols thoroughly.
circle
Practice risk assessment scenarios.
circle
Revise compliance standards and regulations.
Behavioral Questions
circle
Describe teamwork experiences on challenging projects.
circle
Share a time you overcame a security risk.
circle
Explain handling conflicting priorities in crisis.
circle
Discuss adapting to technology changes quickly.