IT Security Administrator - Remote
United States / Canada - Remote
Applications have closed
League Inc.
Position Summary:
As the IT Security Administrator you are responsible for assessing and providing a unified approach to League’s corporate network security infrastructure. You build scalable and reliable systems to manage risk and ensure a secure operating environment, whether in one of our offices or across the cloud.
You design, build, and maintain the security infrastructure. You bring an employee focused mindset while managing risk and maintaining secure access to our resources and data. Personal information, personal health information, and intellectual property are your subject material.
Security is a top priority at League. You will serve a key role in enabling digital leak protections to secure the intellectual property of League and all its products. Working closely with the Internal Audit team, Identity Administrator, and IT Service Desk Team, you will be in charge of coordinating IT audit and reportability for our many security frameworks, SOC 2, HIPAA, GDPR, PIPEDA and any other major privacy legal standard.
In this role you will:
- Proactively make recommendations to improve existing processes, making the internal IT service secure and employee-centric.
- Build, test & maintain League’s hybrid work security infrastructure
- Implement new features and core services in the League security infrastructure
- Architect, implement and own system operation policies including but not limited to Access Control, Encryption Control, Logging, Change Management and Platform Security
Desired Outcomes:
- Tested and evidence based approach to corporate network security and endpoint protection
- Identification and implementation of up to date security protocols to establish a robust security posture that can be exemplified to vendors and auditors
- Implementation and maintenance of DLP policies
- Audit review and response in regards to internal corporate infrastructure
Minimal Qualifications:
- Data Security management experience
- DLP policy implementation
- Internal IT audit evidence fulfillment experience; SOC 2, HIPAA, GDPR, PIPEDA, client audit requests, internal and external audits
Attributes / Characteristics:
- Understands how their work fits into team and company objectives
- Communicates assumptions and gets clarification on tasks up front to minimize the need for rework
- Solicits feedback from others, and gives timely, helpful feedback to peers and managers
Our Application Process: Applying to a role you love can be exhausting, and understanding the next steps can feel vague and uncertain. You have done the hard part of submitting your application; let's do ours by sharing potential next steps
- You should receive a confirmation email after submitting your application.
- A recruiter (not a computer) reviews all applications at League.
- If we see alignment with League's needs, a recruiter will reach out to learn more about your goals. The recruiter will also share the team-specific interview process depending on the roles you are exploring.
- The final step is an offer, which we hope you will accept!
- Prior to joining us, we conduct reference and background checks. Additional checks could be required for US Candidates, depending on the role you are exploring.
Recognize and Avoid Employment scams. Practice safe job searching.
Scammers are getting craftier and leveraging fake job postings to get personal information. Know the warning signs and protect yourself from scammers. Learn more here. Privacy Policy Review our Privacy Policy for information on how League is protecting personal data.* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits Cloud Encryption GDPR HIPAA Network security Privacy SOC SOC 2
Perks/benefits: Equity Health care Salary bonus
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Information Security Specialist jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Kubernetes-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open CI/CD-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open DevSecOps-related jobs