{"id":6206,"date":"2022-09-01T23:28:13","date_gmt":"2022-09-01T23:28:13","guid":{"rendered":"https:\/\/www.cyberdegrees.org\/?p=6206"},"modified":"2023-01-17T20:54:51","modified_gmt":"2023-01-17T20:54:51","slug":"day-in-the-life-of-a-security-administrator","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/day-in-the-life\/","title":{"rendered":"Day in the Life of a Security Administrator"},"content":{"rendered":"<p>Security administrators are key members of cybersecurity teams that work to protect organizations' computer systems. Like many other cybersecurity careers, the well-paid role remains in high demand.<\/p>\r\n<p>Cybersecurity Ventures reported a <a href=\"https:\/\/www.einpresswire.com\/article\/556075599\/cybersecurity-jobs-report-3-5-million-openings-through-2025\" target=\"_blank\" rel=\"noopener\">350% increase<\/a> in vacant cybersecurity jobs from 2013-2021. Their findings also noted a critical shortage in the United States, which has generally led to <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-03-30\/hackers-path-is-eased-as-600-000-cybersecurity-jobs-sit-empty\" target=\"_blank\" rel=\"noopener\">increased pay rates<\/a> for qualified professionals.<\/p>\r\n<p>This guide explores a typical day in the life of a security administrator in detail. The following sections focus on day-to-day security administrator duties, along with common job settings and tips on how to enter this fast-growing career path.<\/p>\r\n\r\n\r\n<h2>What Is the Job Description Of a Security Administrator?<\/h2>\r\n<p>Hacking and other forms of unauthorized system access have been a part of computing since its earliest beginnings. The cybersecurity field began to emerge in the 1970s as a response to these attacks. At the time, computer technology was developing quickly, and many businesses and government agencies had adopted security efforts.<\/p>\r\n<p>The <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-administrator\/\">security administrator role<\/a> evolved as cybersecurity matured into an important field. Security administrators hold mid-level positions on cybersecurity teams. Most of their duties revolve around setting up, managing, and updating their employer's cybersecurity tools.<\/p>\r\n<p>In some settings, security administrators are the next level up from <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/career-and-salary\/\">security analysts<\/a>. In smaller organizations with fewer people on their cybersecurity teams, administrators may also perform analyst tasks.<\/p>\r\n<p>Security administrator positions sometimes appear under other names, like network <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-engineer\/\">security engineer<\/a> or <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-specialist\/\">security specialist<\/a>. They are also called information security managers and information systems security officers.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-administrator\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Read more about security administrators<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"job\" id=\"job\"><\/a>\n\n \r\n<h2>What a Security Administrator Does<\/h2>\r\n<p>In most cases, a <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-architect\/how-to-become\/\">security architect<\/a> designs an organization's cybersecurity systems and policies. Security administrators may help with design duties, but they generally implement the strategies created by team leaders.<\/p>\r\n<p><a href=\"https:\/\/www.comptia.org\/blog\/your-next-move-security-administrator\" target=\"_blank\" rel=\"noopener\">CompTIA describes security administrators<\/a> as entry-level or mid-level cybersecurity team members. They primarily install and manage the technical tools in their employers' cybersecurity programs. Security administrators also troubleshoot and correct issues with these tools, write policy documents, and train other employees to follow best practices.<\/p>\r\n<p>Successful security administrators share several qualities that serve <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">other cybersecurity professionals<\/a>, as well. These include advanced technical knowledge, sound ethics, and a commitment to ongoing learning and development. Security administrators also require strong attention to detail and problem-solving skills.<\/p>\r\n<p>The day-to-day of a security administrator, described in detail in the section below, also poses challenges. Their work often involves long, stressful workdays. The ongoing shortage of cybersecurity workers also forces many employees to take on extra duties.<\/p>\r\n\r\n<sonic-columns columns=\"2\">\r\n    <div>\r\n        <h3>Main Duties of Security Administrators<\/h3>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon>  <strong>Installing and Maintaining Cybersecurity Tools: <\/strong>A typical day in the life of a security administrator often involves setting up <a href=\"https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/\">cybersecurity software and equipment<\/a>. These tools include antivirus programs, user authentication systems, firewalls, and security patches. Security administrators also update these devices and troubleshoot them when bugs or problems occur.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon>  <strong>Checking for Vulnerabilities: <\/strong>Security administrators often assist other team members in their system monitoring duties. They probe systems and networks for vulnerabilities. Security administrators may perform more of these tasks in companies with smaller teams.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon>  <strong>Network Traffic Monitoring: <\/strong>In smaller companies, security administrators hold fluid positions involving more analysis duties. They may actively oversee network traffic for signs of unusual or potentially hostile activity.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon>  <strong>Creating Security Policies: <\/strong>A security administrator's job description often includes duties related to security policy. Security administrators develop security policies alongside other, more senior team members. They also write policy documents and supervise non-technical staff members to ensure they follow best practices.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon>  <strong>Training Colleagues: <\/strong>Some security administrators have more advanced technical profiles. In these cases, security administrators often train coworkers in safe and proper use. Security administrators also provide colleagues with general cybersecurity awareness and education.<\/p>\r\n            \r\n    <\/div>\r\n    <div>\r\n        <h3>Nonstandard Duties for Security Administrators<\/h3>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon>  <strong>Continuity Planning: <\/strong>Organizations create formal plans to prepare for major disruptions or disasters. In the age of digital technology, cybersecurity team members have played key roles in response efforts. Some security administrators offer input, especially regarding cyberattack recovery.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Security Auditing: <\/strong>Companies <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-auditor\/\">perform security audits<\/a> of their systems and networks by reviewing information security systems, tools, policies, and strategies. Some security administrators set up automated auditing tasks and perform manual system checks. These duties may also include writing reports explaining their findings.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Advising Non-Technical Decision-Makers: <\/strong>Members of middle and upper management who work in non-technical roles sometimes need to make decisions that affect technical operations. They may consult team members with technical expertise as a part of the decision-making process. Some security administrators occasionally take part in these consultations.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Writing Performance Reports: <\/strong>Some security administrator job descriptions include preparing reports on situations affecting network status or performance for technical and non-technical personnel.<\/p>\r\n        <p><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Continuing Education: <\/strong>Cybersecurity threats constantly evolve, and new <a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">cyberattack vectors<\/a> develop as technology advances. Professionals need to stay on top of the latest techniques used by malicious actors and develop the skills needed to address them.<\/p>        \r\n    <\/div>\r\n<\/sonic-columns>\r\n\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"typical-day\" id=\"typical-day\"><\/a>\n\n \r\n<h2>A Typical Day for a Security Administrator<\/h2>\r\n<p>A typical day in the life of a security administrator differs based on the employment setting. Some administrators hold full-time positions in companies or public-sector agencies. Others work for technical consulting firms and engage with many clients over a day.<\/p>\r\n<p>A security administrator working full-time for a single employer often spends much of their day on technical tasks. These duties mainly include developing, testing, maintaining, and updating security tools. Security administrators may also monitor traffic alongside security analysts.<\/p>\r\n<p>Some security administrators double as analysts in smaller organizations with limited cybersecurity budgets. In these cases, administrators spend more time on analytical tasks like traffic monitoring and vulnerability testing.<\/p>\r\n<p>Administrators working for consulting firms often spend most of their time on infrastructure tasks in server environments. These professionals mainly work remotely to service clients' system monitoring and information security needs.<\/p>\r\n<p>As with many other cybersecurity roles, security administrators often work long hours. Atypical work hours may also factor into their daily duties, typically for administrators who work for consulting firms in different time zones.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"where\" id=\"where\"><\/a>\n\n \r\n<h2>Where Security Administrators Work<\/h2>\r\n<p>The U.S. Bureau of Labor Statistics (BLS) groups security administrators in its category of information security analysts. According to the BLS, information security analysts' <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">top industries of employment<\/a> in 2020 were:<\/p>\r\n\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='chevron-right' type='solid' size='small' color='#1271E4'><\/sonic-icon> Computer systems design and related services accounted for 26% of the 141,000 U.S. infosec analyst jobs<\/li>\r\n<li><sonic-icon icon='chevron-right' type='solid' size='small' color='#1271E4'><\/sonic-icon> Finance and insurance (18% of jobs)<\/li>\r\n<li><sonic-icon icon='chevron-right' type='solid' size='small' color='#1271E4'><\/sonic-icon> Information (10%)<\/li>\r\n<li><sonic-icon icon='chevron-right' type='solid' size='small' color='#1271E4'><\/sonic-icon> Enterprise management (9%)<\/li>\r\n<li><sonic-icon icon='chevron-right' type='solid' size='small' color='#1271E4'><\/sonic-icon> Administrative and support services (5%)<\/li>\r\n<\/ul>\r\n\r\n<p>The BLS also tracks the percentage of information security analysts working in specific industries. From this viewpoint, the top five U.S. industries as of May 2021 were:<\/p>\r\n\r\n<div id=\"everviz-prTqwGzNs\" class=\"everviz-prTqwGzNs\"><script src=\"https:\/\/app.everviz.com\/inject\/prTqwGzNs\/\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>Meanwhile, BLS geographic profiles for infosec analysts cited these five states as the top employers as of May 2021:<\/p>\r\n\r\n<div id=\"everviz-OM6E8yyeb\" class=\"everviz-OM6E8yyeb\"><script src=\"https:\/\/app.everviz.com\/inject\/OM6E8yyeb\/\" defer=\"defer\"><\/script><\/div>\r\n\r\n<p>Notably, Virginia and Maryland are close to Washington, D.C. This reflects the large numbers of information security professionals working for federal agencies. The public sector is a major employer of security administrators and other cybersecurity specialists.<\/p>\r\n<p>Private-sector employers engaged in activities involving large volumes of sensitive data also have increased cybersecurity needs. In addition to financial services firms, these also include healthcare and education organizations.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/career-and-salary\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">See how location affects salary for security administrators<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<h2>Should You Become a Security Administrator?<\/h2>\r\n<p>A typical day in the life of a security administrator can be demanding. People who succeed in the role are passionate about their work and committed to ongoing professional development, which may include earning <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/certifications\">relevant certifications<\/a>.<\/p>\r\n<p>Security administrators hold mid-level roles in cybersecurity teams. Many administrators advance into their positions after gaining experience in entry-level roles.<\/p>\r\n<p>Cybersecurity careers attract candidates because of the <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/career-and-salary\">high pay and strong demand<\/a>. They may fail to realize the extent of technical knowledge and work required for success in the sector.<\/p>\r\n<p>If you are tech-savvy with a knack for designing solutions to complex problems, then a career in cybersecurity may be a good match. However, remember that the role may include high-stress work with long days.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/how-to-become\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover how to become a security administrator<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"interview\" id=\"interview\"><\/a>\n\n\r\n<h2>Professional Spotlight: <span class=\"text-secondary-dark\">Michael Silbernagel<\/span><\/h2>\r\n\r\n<p><strong>What's a typical day like for you?<\/strong><\/p>\r\n<p>Every day is different in my role as a senior security analyst\/lead. It's a challenging, dynamic, and exciting position in the cybersecurity environment. No two days are ever the same, and there is always something new to learn.<\/p>\r\n\r\n<p><strong>What other teams do you work with on a regular basis?<\/strong><\/p>\r\n<p>At SysGen, there are ample opportunities for cross-functional work and collaboration with other teams. For example, I regularly work with our cybersecurity incident response, escalations group, infrastructure solutions, service delivery, digital advisory, sales and marketing, and executive\/senior management teams.<\/p>\r\n\r\n<p><strong>Is there a lot of collaboration in your security administrator role?<\/strong><\/p>\r\n<p>Yes. Most of my work is collaborative and involves different individuals and teams.<\/p>\r\n\r\n<p><strong>Do you work in an office or from home (or a hybrid)?<\/strong><\/p>\r\n<p>SysGen is an advocate of the modern workplace. Because of this, I can benefit from a hybrid work environment and spend most of my time working remotely.<\/p>\r\n\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    <p><mark style=\"background-color:#E7E9F8;\"><span  class=\"heading-3\">&ldquo;If you are passionate about technology, securing critical infrastructure, willing to work hard, and want to help people, then a career in cybersecurity may be the answer for you.&rdquo;<\/span><\/mark>\r\n<br><small>&mdash;Michael Silbernagel, Senior Security Analyst<\/small><\/p>\n  <\/div>\n<\/section>\r\n\r\n<p><strong>What's your favorite part of working in this role? The most challenging part?<\/strong><\/p>\r\n<p>My favorite part of my work is the flexibility of working from anywhere and the opportunities to mentor our security team members.<\/p>\r\n<p>The most challenging part of my role is when a non-client organization reaches out with a request for assistance with a breach. These situations are tricky because when this happens, we have zero visibility into their environment. After all, they're not our client. So before we tackle the breach, we may need to familiarize ourselves with their environment first, which might require more resources.<\/p>\r\n\r\n<p><strong>Any other insights about your day to day in security administration that may help people considering this career path?<\/strong><\/p>\r\n<p>There is a great demand for cybersecurity professionals worldwide. If you are passionate about technology, securing critical infrastructure, willing to work hard, and want to help people, then a career in cybersecurity may be the answer for you.<\/p>\r\n\r\n<p><strong>For whom do you think this career is a good fit? Why?<\/strong><\/p>\r\n<p>Cybersecurity requires flexibility and creative thinking. Dynamic and creative problem-solvers who are willing to work hard and have a passion for technology and helping people would be ideal for a career in this field.<\/p>\r\n\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-white \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1666885217\/CyberDegrees.org\/Michael-Silbernagel-SysGen-headshot\/Michael-Silbernagel-SysGen-headshot.jpg?_i=AA\" alt=\"Portrait of Michael Silbernagel\" height=\"240\" loading=\"lazy\" srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1666885217\/CyberDegrees.org\/Michael-Silbernagel-SysGen-headshot\/Michael-Silbernagel-SysGen-headshot.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_249,h_300,c_scale\/f_auto,q_auto\/v1666885217\/CyberDegrees.org\/Michael-Silbernagel-SysGen-headshot\/Michael-Silbernagel-SysGen-headshot-249x300.jpg?_i=AA 249w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\">Michael Silbernagel<\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-700 md:mb-0 md:pb-0\">\n      \r\n  <div slot=\"contentRight\">\r\n    <p>Michael Silbernagel is the senior security analyst at <a href=\"https:\/\/sysgen.ca\/\" target=\"_blank\" rel=\"noopener\">SysGen<\/a>, a client-focused IT consulting organization for small and mid-sized businesses. Michael is the cybersecurity consulting and incident response team leader and created SysGen's Enhanced Security Services &mdash; a holistic and comprehensive cybersecurity offering focusing on people, technology, policy, and process.<\/p>\r\n    <p>He is a lifelong technology enthusiast, passionate about cybersecurity, cloud computing, IoT, and blockchain, with over 20 years of industry experience in both the public and private sectors.<\/p>\r\n    <p>Michael holds a bachelor of science degree in computer information systems. He is a certified information systems security professional and a certified cloud security professional.<\/p>\r\n  <\/div>\r\n\n    <\/div>\n          <span class=\"flex items-center max-w-xs my-8\">\n                                  <a class=\"w-6 h-6 p-px mx-2 border rounded-sm text-primary-700 border-box\" href=\"https:\/\/www.linkedin.com\/in\/michael-silbernagel\/\" target=\"_blank\" title=\"Michael Silbernagel&#039;s LinkedIn\" rel=\"noopener\">\n            <svg class=\"text-gray-700 fill-current\" viewBox=\"0 0 25 25\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n              <path d=\"M3.4 6.4C1.6 6.4.5 5.3.5 3.8c0-1.4 1.1-2.6 2.9-2.6s2.9 1.1 2.9 2.6-1.1 2.6-2.9 2.6zM6 23.8H.9V8.5h5.2zm18.3 0h-5.2v-8.2c0-2.1-.8-3.4-2.6-3.4-1.4 0-2.3 1-2.6 1.9-.2.3-.2.8-.2 1.3v8.4h-5c.2-13.9.2-15.3.2-15.3H14v2.3c.6-1.1 1.9-2.6 4.7-2.6 3.4 0 5.8 2.3 5.8 6.9v8.7z\"><\/path>\n            <\/svg>\n          <\/a>\n                      <\/span>\n      <\/div>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"prepare\" id=\"prepare\"><\/a>\n\n \r\n<h3>How to Prepare for a Career as a Security Administrator<\/h3>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/how-to-become\">Aspiring security administrators<\/a> can follow multiple paths to prepare for their careers. Employers' requirements vary, but many prefer or require degrees in computer science or related fields for entry-level jobs.<\/p>\r\n<p>An associate degree may open doors to some roles. However, companies often look for applicants with bachelor's degrees or higher when filling positions with advancement potential.<\/p>\r\n<p>Hiring managers sometimes value hard technical skills over degrees. You can acquire these skills through <a href=\"https:\/\/www.cyberdegrees.org\/listings\/cyber-security-bootcamps\/\">cybersecurity bootcamps<\/a> or self-directed education. It may also help to validate your abilities by earning industry-standard <a href=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\">cybersecurity certifications<\/a>.<\/p>\r\n<p>If you are considering a career change into cybersecurity, part-time degree programs and bootcamps offer added flexibility. These options allow you to build knowledge without having to work around full-time weekday class schedules.<\/p>\r\n\r\n\r\n<h3>Learn More About Security Administrators<\/h3>\r\n<sonic-columns columns=\"4\">\r\n    <sonic-card\r\n    title='What Is a Security Administrator?'\r\n    link='https:\/\/www.cyberdegrees.org\/jobs\/security-administrator\/'\r\n    image='https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/c_fill,g_auto,w_600,h_338,dpr_2\/f_auto,q_auto\/v1620063137\/CyberDegrees.org\/GettyImages-953534132.jpg?_i=AA'\r\n    icon='lock-closed'\r\n    >\r\n    This resource offers a detailed look into a security administrator's job description and core duties.\r\n    <\/sonic-card>\r\n    <sonic-card\r\n    title='How to Become a Security Administrator'\r\n    link='https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/how-to-become'\r\n    image='https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2022\/09\/how-to-become-a-security-admin.jpg'\r\n    icon='lock-closed'\r\n    >\r\n    Aspiring security administrators can follow many different paths to reach their career goals. This page describes various options and strategies.\r\n    <\/sonic-card>\r\n  \r\n    <sonic-card\r\n    title='Salary and Career Outlook for Security Administrators'\r\n    link='https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/career-and-salary'\r\n    image='https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2022\/09\/GettyImages-1010852112.jpg'\r\n    icon='lock-closed'\r\n    >\r\n    Like many other cybersecurity roles, security administrators have a strong employment outlook. Dive deep into the data with this resource.\r\n    <\/sonic-card>\r\n\r\n    <sonic-card\r\n    title='Security Administrator Certifications'\r\n    link='https:\/\/www.cyberdegrees.org\/careers\/security-administrator\/certifications'\r\n    image='https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2022\/09\/GettyImages-1078726270.jpg'\r\n    icon='lock-closed'\r\n    >\r\n    Many cybersecurity certifications hold relevance for security administrators. Explore options and learn how certification can complement your existing qualifications.\r\n    <\/sonic-card>    \r\n<\/sonic-columns>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n \r\n<h2>FAQ About the Day to Day of Security Administrators<\/h2>\r\n<hr style=\"background:  #1222B6; border:0; height:7px\" \/>\r\n\r\n<h3><strong>What does a security administrator do on a daily basis?<\/strong><\/h3>\r\n<p>Core duties include developing, installing, updating, and troubleshooting the tech tools that protect networks and databases. Security administrators also develop cybersecurity policies and ensure compliance.<\/p>\r\n<h3><strong>Is the day to day of a security administrator stressful?<\/strong><\/h3>\r\n<p>Industry research suggests that many cybersecurity professionals become stressed or burned out by their jobs over time. Increased stress levels generally correlate with higher levels of responsibility. Security administrators occupy mid-level roles, which may leave them prone to these pressures.<\/p>\r\n<h3><strong>Does a security administrator need to know how to code?<\/strong><\/h3>\r\n<p>Some security administrators develop custom cybersecurity tools and solutions in-house. A strong working <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-programming-languages\">knowledge of programming languages<\/a> like C, Python, JavaScript, PHP, and SQL may be an asset.<\/p>\r\n<h3><strong>What is the most rewarding part of working in security administration?<\/strong><\/h3>\r\n<p>In 2020, Synopsys polled <a href=\"https:\/\/www.synopsys.com\/blogs\/software-security\/cyber-security-job-rewarding\/\" target=\"_blank\" rel=\"noopener\">nearly 900 cybersecurity professionals<\/a> to ask what drew them to the profession. The \"ability to help people\" was the top answer, followed by \"[job] stability and growth\" and \"interesting challenges.\"<\/p>","protected":false},"excerpt":{"rendered":"Curious about working as a security administrator? Learn about their day-to-day work responsibilities, along with common work settings and education requirements.","protected":false},"author":41,"featured_media":6208,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-6206","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/6206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=6206"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/6206\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/6208"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=6206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=6206"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=6206"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=6206"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=6206"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=6206"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=6206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}