Enterprise Security and Monitoring Administrator
Listed on 2026-01-24
-
IT/Tech
Cybersecurity, Systems Administrator, Network Security, IT Specialist
Greenberg Traurig (GT) – Technology Team
• Enterprise Security and Monitoring Administrator
Greenberg Traurig (GT), a global law firm with locations across the world in 15 countries, offers competitive compensation and an excellent benefits package, along with the opportunity to work within an innovative and collaborative environment.
We are seeking a professional who thrives in a fast‑paced, deadline‑driven environment. The ideal candidate possesses strong problem‑solving and decision‑making abilities, ensuring efficiency and accuracy in every task. With a dedicated work ethic and a can‑do attitude, you will take initiative and approach challenges with confidence and resilience. Excellent communication skills are essential for collaborating effectively across teams and delivering exceptional client service.
If you demonstrate initiative, adaptability, and innovation, we invite you to join our team.
This role can be based in various offices on a hybrid basis and reports to the Enterprise Monitoring and Systems Management Supervisor.
Position SummaryThe Enterprise Security and Monitoring Administrator is responsible for managing and maintaining the security and monitoring systems of the firm’s servers, applications, data, and cloud platforms. The administrator troubleshoots and resolves technical issues, investigates and remediates security incidents, ensures the security of servers, applications, services, and data, and maintains the integrity of the server environment with regular security updates and patches.
The role requires trustworthy, reliable individuals who uphold strict ethical standards and a willingness to work flexible hours and participate in on‑call rotation.
- Manages and supports endpoint protection solutions (e.g., EDR tools, Microsoft Defender for Endpoint), including log integrations into platforms
- Monitors, detects, and responds to security incidents and threats using antivirus, EDR, ITDR, FIM, SIEM, and data security tools
- Monitors and audits user activity to identify and evaluate anomalous behavior and activity, and coordinates with other IT staff and external parties as needed
- Implements and maintains security configurations and access rights to protect against unauthorized access, data loss, and other security threats against the firm’s on‑prem infrastructure and cloud platforms
- Maintains regular server and application security updates and patches to mitigate vulnerabilities and enhance system performance, following established server patch management processes and procedures
- Develops custom alerts, dashboards, and reports to monitor anomalous activity and governance enforcement
- Conducts regular security audits and assessments on servers, applications, and related infrastructure services to identify and address misconfigurations and policy gaps and implement security best practices and recommendations
- Monitors and analyzes performance, availability, and security alerts for servers, applications, and services, using various tools and methods, such as dashboards, alerts, reports, logs, etc.
- Provides Tier 3 technical support and guidance for security and monitoring‑related issues
- Develops and implements SOAR playbooks for automated response to threat detections
- Collaborates with information security and compliance teams to ensure compliance with industry standards
- Supports project delivery and execution of tasks related to areas of team responsibility
- Stays current with emerging trends and best practices in security, monitoring, cloud security, and AI model infrastructure security
- Strong knowledge of Microsoft Windows, Active Directory, Entra , and Microsoft 365
- Good working knowledge of cloud platforms such as Microsoft Azure
- Excellent knowledge in security and monitoring tooling, such as antivirus, endpoint protection, identity protection, data security, application‑based firewalls, SIEM, etc.
- Strong knowledge of public key infrastructure (PKI), ADCS, and encryption
- Strong knowledge of Zero Trust security principles
- Strong understanding of identity and access management and role‑based access control concepts
- Solid understanding of…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).