Network & Security Manager Administrative & Office Jobs - Wichita, KS at Geebo

Network & Security Manager

Headquartered in Wichita, KS AgVantis is a unique and distinct technology solutions and business services organization, providing its solutions and services to both Farm Credit Banks and Member-Owned Associations.
We help navigate the complex Farm Credit regulatory environment with solutions and services that are designed by and for Farm Credit Entities to meet their unique business needs.
Since our inception in August of 2001, AgVantis has and continues to develop and provide customized financial software and business services to Farm Credit Associations around the United States.
Benefits offered by AgVantis:
- Investment in employee development and training - Medical, Dental, Vision coverage (HSA and FSA available) - Outstanding 401K - automatic 3% employer contribution, plus match up to 6% - Generous Paid Time Off, plus 10 paid holidays - Competitive Incentive Compensation Plan - Disability& Life Insurance - Employee mental, physical, and financial wellness programs - Gym Membership Discount - Zander Identity Theft Protection for employee and family - Hybrid Work Schedules POSITION SUMMARY The Network& Security Manager will be responsible for the oversight of the AgVantis network and security team and will lead the design, management, and implementation of security & network tools, projects, and policies across the organization.
An emphasis will be placed on secure IT design and the identification and remediation of organizational network and security issues.
A successful candidate will have a strong understanding of network and security infrastructure and have the ability to successfully manage both technical personnel and customer relationships.
An ability to assist with technical implementations of network and security tools is also highly desired.
ESSENTIAL FUNCTIONS 1.
Serving as the primary contact for network and system performance, availability, hardening, and implementation of enterprise network and security architecture.
2.
Providing mentorship and leadership to junior network and security administrators by arranging, leading, and participating in team meetings and trainings; contributing to team knowledge share and skill development; and providing leadership-level guidance and coaching to team members.
3.
Working with the Director of Data Management, the Information Security Officer, the Data Governance Team, and other managers to create, develop and direct implementation of security standards and best practices for the organization.
4.
Assists in providing internal IT support in the maintenance and administration of network and security systems across the environment, including systems software, applications software, hardware, and configurations.
5.
Leading the team in provision of timely and accurate response to customer support requests while proactively troubleshooting, diagnosing, and resolving hardware, software, and other network and system problems.
6.
Ensuring IT security audits are conducted periodically or as needed for compliance adherence.
OTHER FUNCTIONS 1.
Performing other duties and assumes other responsibilities as assigned.
MINIMUM QUALIFICATIONS Bachelor's Degree in Computer Science, Computer Information Systems, IT Network/Security, or related field 5 years or more prior IT Network/Security experience 2 years or more leadership of a SOC Experience with network engineering (i.
e.
design/analysis of networks, routers, switches, firewalls, protocol), installing and configuring networks, routers, and firewalls.
Must have experience using specialized test equipment and network analysis tools (e.
g.
, ping trace-route, network management software, and loopbacks).
Knowledge of computer operating systems, hardware, and software (to include HPC, GPU, Linux, and Windows); writing, editing, and maintaining network management documentation.
Independent decision-making and problem-solving skills with a high level of organization Excellent analytical, problem-solving and communication skills.
Outstanding interpersonal and leadership skills.
Network and security certifications are highly desired (i.
e.
Linux, CompTIA, CISSP, CCIE, CCDE, etc.
).
MATERIALS AND EQUIPMENT Policy manuals, procedures manuals, training manuals, computer equipment, calculator, telephone, printer, copy machine, projector, video equipment.
PHYSICAL REQUIREMENTS Light work:
Exerting up to 20 pounds of force occasionally, up to 10 pounds of force frequently, and/or a negligible amount of force constantly to move objects.
MENTAL ACTIVITIES Analyzing, calculating, comparing, consulting, coordinating, designing, documenting, editing, evaluating, interpreting, organizing, planning, presenting, reading, specifying, training.
PHYSICAL ACTIVITIES Hearing, kneeling, reading, repetitive motions, talking, walking, writing.
Notice:
This job description in no way states or implies that these are the only duties to be performed by the employee occupying this position.
Employees will be required to follow any other job-related instructions and to perform and other job-related duties requested by their supervisor.
This document does not create an employment contract, express or implied, and should not be construed as such.
Employment by the company is at will, not for a definite term.
Recommended Skills Administration Analytical Architecture Auditing Certified Information Systems Security Professional Communication Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3w88z77lzh16gg78yk', 'ExternalApply-j3w88z77lzh16gg78yk'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.