Logo
Greenberg Traurig

Enterprise Security and Monitoring Administrator

Greenberg Traurig, Salt Lake City, UT


Greenberg Traurig (GT), a global law firm, has an exciting full-time employment opportunity for an Enterprise Security and Monitoring Administrator in the technology department of various offices. We offer competitive compensation and an excellent benefits package.

Position Summary:

The Enterprise Security and Monitoring Administrator is responsible for managing and maintaining the security and monitoring systems of the firm's network, servers, applications, data, and cloud platforms. The administrator will troubleshoot and resolve security incidents, ensure the security of servers, applications, services, and data, maintain the integrity of the server environment with regular security updates and patches, and provide technical support and guidance to other IT staff and users. The administrator will also monitor the performance and availability of the IT infrastructure, identify and resolve issues, and generate reports.

Duties & Responsibilities:
  • Installs, configures, updates, and maintains security and monitoring tools and systems, such as antivirus, intrusion detection systems, data security platforms, public key infrastructure, identity protection platforms, etc.
  • Monitors and analyzes the security and performance of servers, applications, and data, using various tools and methods, such as dashboards, alerts, reports, logs, etc.
  • Identifies and responds to security incidents and breaches, following the incident response plan and procedures, and coordinates with other IT staff and external parties as needed
  • Performs regular security audits and assessments, and implements security best practices and recommendations, to ensure compliance with security policies and standards, and to protect the firm's data and assets
  • Plans and implements server security updates and patches to fix vulnerabilities and enhance system performance
  • Implements and manages security measures to protect against unauthorized access, data loss, and other security threats against the firm's on-prem infrastructure and cloud-based platforms and data
  • Provides technical support and guidance to other IT staff and users on security and monitoring related issues and educate them on security awareness and best practices
  • Researches and evaluates new security and monitoring technologies and solutions and recommends improvements and enhancements to the existing systems and processes
  • Documents and maintains security and monitoring policies, procedures, and configurations, and updates them as needed


Skills & Competencies:
  • Strong knowledge of MS operating systems (Windows 10/11 and Windows Server 2012-2022)
  • Good working knowledge of cloud platforms like Microsoft Azure
  • Strong knowledge and skills in security and monitoring tools and systems, such as firewalls, antivirus, intrusion detection systems, vulnerability scanning, log analysis, SIEM systems, etc.
  • Strong understanding of IT security protocols and standards
  • Strong knowledge of and experience with Active Directory security
  • Strong knowledge of and experience managing NTFS and Share permissions
  • Good working knowledge of MS application services, such as Exchange, SQL, IIS and SharePoint
  • Strong knowledge of networking monitoring in a TCP/IP environment
  • Experience working with WMI, Syslog and Performance Monitor
  • Excellent scripting skills in PowerShell; API programming is a plus
  • Strong analytical and problem-solving skills, and ability to troubleshoot and resolve security and performance issues
  • Strong communication and interpersonal skills, and ability to work effectively with other IT staff and users
  • Ability to articulate issues, risks, and proposed solutions to various levels of technology staff, management, and non-technical audiences
  • Strong attention to detail and accuracy, and ability to document and maintain security and monitoring policies, procedures, and configurations
  • Ability to multitask efficiently yet prioritize and organize competing work demands
  • Candidate must be a self-starter and independent, yet function as an integral part of a team
  • Ability to work flexible hours and be on-call


Qualifications & Prior Experience:
  • Bachelor's degree in Computer Science, Information Systems, or related field, or equivalent work experience
  • At least 5 years of experience managing medium to large MS Windows environments, preferably in a law firm or similar environment
  • Professional cybersecurity certifications, such as GSEC, CISA, CEH, CISSP, etc., are a plus


Greenberg Traurig is committed to diversity and inclusion in the workplace. Individuals seeking employment at Greenberg Traurig are considered without regards to race, color, religion, sex, sexual orientation, gender identification, national origin, age, marital status, ancestry, disability, veteran status, or genetic information, among other protected bases.

Exemplifying our commitment to promoting inclusion and equity across our platform, the firm participates in the Mansfield Rule Certification Program (Mansfield). Mansfield, which is facilitated by The Diversity Lab, focuses on equal opportunity, fairness, and inclusivity. The Mansfield requirements are anchored in the consideration of expanded talent pools considered for select positions and open roles within the law firm and the implementation of and access to transparent processes. Utilizing the Mansfield framework, the firm's progress and outcomes are measured and documented through Mansfield Certification Plus Metrics. In 2023, GT achieved Mansfield 6.0 Certification Plus. We are excited about our ongoing participation in Mansfield given the program's alignment with the firm's commitment to opportunities for advancement that are inclusive for everyone. Providing your data during the application process helps us with achieving our goals and with meeting reporting/record-keeping obligations under federal and state law and other legal requirements. Providing your data is entirely voluntary and will not be considered in the hiring process or thereafter. Any information that you do provide will be treated confidentially.