×
Register Here to Apply for Jobs or Post Jobs. X

Security Administrator; Midland or Houston

Job in Midland, Midland County, Texas, 79709, USA
Listing for: The University of Texas System
Full Time position
Listed on 2025-11-11
Job specializations:
  • IT/Tech
    Cybersecurity, IT Support, Network Security, Systems Administrator
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Security Administrator (Midland or Houston)

Security Administrator (Midland or Houston)

Application for the Security Administrator (Midland or Houston) role at The University of Texas System
.

Position Details
  • FLSA Status: Exempt
  • Earliest

    Start Date:

    Immediately
  • Salary: Salary commensurate with experience
  • Hours per Week: 40 hours weekly
  • Hiring Department: University Lands
Purpose of Position

The Security Administrator (Cyber Defense) provides hands‑on cybersecurity protection and response capabilities for University Lands. This position safeguards UL’s information assets by managing firewalls and network segmentation, overseeing vulnerability management across all systems, and leading response and recovery for cybersecurity incidents. Working closely with UT System’s central Information Security Office, this role enhances and operates a local “branch SOC,” providing dashboards, alerting, and investigative capabilities that integrate with enterprise‑level monitoring.

Essential

Functions
  • Security Operations & Network Defense
    • Administer and tune next‑generation firewalls, IDS/IPS, and segmentation policies.
    • Monitor and analyze alerts from SIEM, EDR, and firewall platforms.
    • Build and maintain dashboards and detection rules for local SOC visibility.
    • Perform packet‑level and log analysis to identify malicious or anomalous activity.
    • Coordinate with UT System SOC to align alerting, escalation, and detection coverage.
  • Vulnerability Management
    • Conduct regular vulnerability scans across servers, endpoints, and network infrastructure.
    • Interpret results, prioritize risk, and remediate or coordinate remediation.
    • Track remediation metrics and produce executive summaries of risk posture.
    • Apply configuration baselines and ensure patch management compliance.
  • Incident Response & Recovery
    • Lead containment, eradication, and recovery during security incidents (e.g., ransomware, intrusion, data breach).
    • Maintain and execute incident response runbooks and evidence handling procedures.
    • Perform root‑cause and post‑incident analysis; recommend improvements.
    • Coordinate with central ISO and vendors for forensics or law‑enforcement notifications.
  • Security Engineering & Implementation
    • Implement and maintain security technologies such as MFA, enterprise EDR/XDR platforms, and vulnerability management systems.
    • Secure virtualization, network infrastructure, and server/storage systems.
    • Support zero‑trust and micro‑segmentation initiatives within on‑prem and hybrid environments.
    • Collaborate on new system deployments to ensure secure design and compliance.
  • Compliance & Risk Support
    • Assist in risk assessments, third‑party security reviews, and audits.
    • Provide documentation and technical responses to TAC 202, UTS 165, and NIST CSF controls.
    • Maintain evidence repositories for audit readiness and continuous improvement.
  • Collaboration & Awareness
    • Partner with Infrastructure, Client Services, and Solutions Development teams to ensure consistent security practices.
    • Provide technical input for user‑awareness initiatives and IT security training.
    • Participate in after‑hours response during critical incidents or maintenance windows.
Knowledge, Skills & Abilities
  • Proficient in administering Windows and Linux systems, virtualization platforms, and enterprise network environments.
  • Experience with vulnerability scanning tools, patch management platforms, and firewall configurations.
  • Familiarity with cybersecurity frameworks and compliance standards such as NIST CSF.
  • Capable of translating complex security issues into actionable tasks.
  • Strong troubleshooting skills across multiple technology layers.
  • Ability to work independently in a high‑responsibility environment.
  • Effective communicator with both technical and non‑technical staff.
  • This position requires the ability to maintain the security and integrity of UT System Administration and its infrastructure.
Required Qualifications
  • Bachelor’s degree in Information Technology, Cybersecurity, or a related field.
  • Minimum of five (5) years’ experience in IT Operations with a strong security component.
  • Each additional year of experience over the required minimum may substitute for one year of college (30 semester hours) on a year‑for‑year basis.
Preferred Qualifications
  • Certifications such as…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary