Network and Infrastructure Security Specialist

Solairus AviationPetaluma, CA
$85,000 - $93,000

About The Position

The IT Network and Infrastructure Security Specialist is responsible for the administration, security, and resilience of the organization’s network, server, and Microsoft cloud infrastructure. This role ensures secure configuration, monitoring, and maintenance of enterprise IT systems, including firewalls, switches, wireless networks, identity platforms, physical and virtual servers, and cloud environments. The specialist works closely with IT, infrastructure, and security teams to safeguard systems against threats, maintain high availability, and support security initiatives across the organization. This position requires strong hands-on experience in IT infrastructure administration as well as practical security administration expertise.

Requirements

  • Associate’s or bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or related field (or equivalent experience).
  • 3+ years of hands-on experience in IT infrastructure administration, network administration, or security operations.
  • Strong experience managing enterprise networks (LAN/WAN), switches, firewalls, VPN, and wireless systems.
  • Advanced working knowledge in Microsoft M365 administration.
  • Working knowledge of Windows Server, Active Directory, Group Policy, Linux systems, and virtualization platforms.
  • Experience with security tools (SIEM, EDR, firewalls, vulnerability scanners, identity security).
  • Solid understanding of cybersecurity principles, network security, identity and access management, and cloud security (AWS/Azure).
  • Ability to analyze threats, evaluate risks, and provide practical remediation recommendations.
  • Effective communication, analytical thinking, and problem-solving skills.

Responsibilities

  • Manage, maintain, and troubleshoot network infrastructure, including switches, routers, firewalls, VPN appliances, and wireless systems.
  • Administer Windows and Linux servers, virtualization platforms (VMware / Hyper‑V), and enterprise storage solutions.
  • Ensure network performance, availability, and uptime through proactive monitoring and maintenance.
  • Implement and maintain secure configurations, patching, hardening standards, and baseline system builds.
  • Manage and monitor security tools, including Identity Management (OKTA), Mobile Device Management (MDM), Remote Monitoring and Management (NinjaOne), firewalls, IDS/IPS, vulnerability scanners, and identity security platforms.
  • Assist Security Analysis with SIEM and EDR administration support.
  • Maintain endpoint security policies, access controls, MFA, privileged accounts, and identity governance settings.
  • Perform and validate vulnerability scans, system hardening, and remediation of infrastructure weaknesses.
  • Ensure network segmentation, zero-trust controls, and secure access principles are implemented across environments.
  • Participate in incident response activities, supporting containment, remediation, and recovery actions.
  • Help investigate security alerts, perform triage, and support containment, eradication, and recovery activities.
  • Conduct root-cause analysis and contribute to strengthening security controls to reduce recurrence.
  • Maintain incident documentation, reporting, and continuous improvement of response processes.
  • Collaborate with third‑party security partners (SOC/MDR) on detection and mitigation activities.
  • Support risk assessments across network, server, cloud, and identity systems.
  • Document, track, and support remediation of risks and vulnerabilities across infrastructure assets. Assist with IT and security policy enforcement, compliance audits, and regulatory alignment (NIST, CIS, SOC 2, GDPR, CCPA).
  • Participate in building and maintaining security roadmaps and improvement plans.
  • Work with IT, cloud, infrastructure, and business units to ensure secure design and implementation of systems.
  • Provide reporting on infrastructure health, security posture, patch status, and risk findings.
  • Support security awareness initiatives and ensure proper security practices are followed throughout the organization.
  • Administer identity and privileged account management using Okta, including lifecycle management, MFA enforcement, role‑based access, and privileged identity controls.
  • Maintain endpoint security policies, access controls, MFA, privileged accounts, and identity governance settings.
  • Perform and validate vulnerability scans, system hardening, and remediation of infrastructure weaknesses.
  • Ensure network segmentation, zero‑trust controls, and secure access principles are implemented across environments.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service