×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Infrastructure Administrator

Job in Tampa, Hillsborough County, Florida, 33646, USA
Listing for: General Dynamics Information Technology
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, IT Consultant
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity Infrastructure Administrator,

Type of Requisition

Regular

Clearance Level Must Currently Possess

Top Secret/SCI

Clearance Level Must Be Able to Obtain

Top Secret/SCI

Public Trust/Other Required

None

Job Family

Cyber and IT Risk Management

Job Qualifications
  • Skills:

    IPS/IDS, Security Requirements, System Security
  • Certifications:

    None
  • Experience:

    5+ years of related experience
  • US Citizenship

    Required:

    Yes
Job Description

Advance your career while impacting our national security in cyber as a Cybersecurity Infrastructure Administrator e, technologists have many paths to grow a meaningful career supporting cyber missions and operations across the federal government.

MEANINGFUL WORK AND PERSONAL IMPACT

As a Cybersecurity Infrastructure Administrator
, the work you’ll do at GDIT will be impactful to the mission of USCENTCOM. You will play a crucial role in configuring, tuning, optimizing, and maintaining critical security infrastructure to safeguard the organization’s digital assets against evolving cyber threats. You'll be responsible for overseeing the operation and maintenance of essential cybersecurity systems, including IDS/IPS technologies, Security Onion, and firewalls from different vendors and network taps.

Responsibilities
  • Configuration and Optimization:
    • Collaborate with cybersecurity stakeholders to define and implement effective configurations for boundary infrastructure and network access control solutions.
    • Customize and optimize alert rules, correlation searches, and detection mechanisms to align with security requirements and organizational objectives.
    • Work with other Cybersecurity Engineering team members and will be required to interact with end users to gather requirements, perform troubleshooting, and aid as necessary.
    • Integrate cyber tools with variety of legacy data sources.
  • Maintenance and Support:
    • Conduct routine maintenance tasks, such as software updates, patches, and performance tuning, to ensure the reliability and efficiency of cybersecurity systems.
    • Provide timely support and troubleshooting assistance to address issues and incidents related to various IDS/IPS, firewall, security onion or other boundary and sensor related technology, collaborating with vendors or higher‑level support as necessary.
    • Perform regular system audits and health checks to identify vulnerabilities, misconfigurations, or performance issues, implementing corrective actions as needed.
    • Provide occasional presentations of tool capabilities to leadership.
  • Policy Development and Compliance:
    • Develop and enforce configuration standards, security policies, and operational procedures for cybersecurity systems, ensuring compliance with regulatory requirements and industry best practices.
    • Monitor compliance with security policies and regulations through audits, assessments, and reporting activities, taking corrective actions to address any deviations or gaps.
    • Collaborate with compliance and audit teams to streamline regulatory compliance efforts and demonstrate adherence to security standards.
    • Integration and Automation:
      Integrate cybersecurity systems with other security controls, data sources, and IT infrastructure components to create a cohesive security ecosystem.
    • Develop and maintain automation scripts, playbooks, and workflows as capable within boundary related platforms to automate routine tasks, orchestrate incident response processes, and enhance operational efficiency.
    • Explore opportunities for innovation and continuous improvement by leveraging automation, orchestration, and integration with emerging technologies and industry trends.
  • Training and Knowledge Sharing:
    • Provide training sessions and document processes to empower internal teams with the knowledge and skills required to effectively utilize cybersecurity systems.
    • Share expertise, best practices, and lessons learned with colleagues through formal and informal channels, fostering a culture of collaboration and knowledge sharing within the cybersecurity team.
WHAT YOU’LL NEED TO SUCCEED

Bring your cyber expertise and drive for innovation to GDIT. The Information Security Analyst Principal must have:

  • Education:

    Bachelor’s degree in Information Systems, Computer Science, Computer Engineering, or another related…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary