Job Title: Systems & Security Administrator
Department: IT Operations - IT & InfoSec
Level: Mid–Senior Level
Experience: 5 to 7 years
Working Hours: As per Job requirement
Job Description
Tru Performance is a B2B digital marketing and IT operations agency serving enterprise clients across the US and EMEA. We are placing a dedicated Systems & Security Administrator on behalf of one of our fast-growing US-based SaaS clients operating in the video communications and sales enablement space.
We are looking for a highly skilled and self-directed professional to take full ownership of the client's internal IT security, device management, and compliance function. This is not a helpdesk role — it is a dedicated, strategic position for someone who understands that security posture, SOC 2 readiness, and operational IT hygiene are business-critical functions. You will operate as an embedded part of the client's team, working directly with their CTO and leadership, while being employed and managed through Tru Performance.
The ideal candidate brings deep hands-on experience across security management, endpoint administration, and IT compliance frameworks — and is comfortable operating independently with minimal hand-holding. If you are proactive, security-first in your thinking, and excited by the challenge of owning a function from the ground up in a fast-growing SaaS company, this role is built for you.
Responsibilities
Security & Vulnerability Management
- Develop, implement, and continuously manage the client's information security strategy, policies, and procedures — covering both technical controls and organisational practices
- Monitor the environment for security incidents, vulnerabilities, and anomalous activity; lead investigation and response efforts with clear escalation and documentation protocols
- Conduct regular security audits, penetration test reviews, and risk assessments to proactively identify and remediate gaps before they become incidents
- Own the patch and update management lifecycle — ensuring timely deployment of security patches across all endpoints, applications, and infrastructure components
- Manage and configure firewalls, endpoint antivirus, email security, and intrusion detection/prevention systems — ensuring all security tooling is current, tuned, and effective
- Lead threat intelligence review, staying current on emerging vulnerabilities and attack vectors relevant to a SaaS company handling business video communications data
Device Management
- Own the full lifecycle of the client's endpoint estate — including procurement coordination, configuration, deployment, and decommissioning of laptops and other endpoint devices in collaboration with Lenovo and Microsoft
- Define and maintain Standard Operating Environments (SOEs) for all endpoint devices — including OS baseline configurations, software deployment, and security hardening standards
- Manage Hexnode MDM (or equivalent) for device enrolment, policy enforcement, remote wipe, and compliance monitoring across the fleet
- Coordinate timely equipment setup and distribution for new hire onboarding and role changes — working closely with HR and the People team
- Maintain an accurate, up-to-date IT asset inventory and oversee lifecycle management from procurement through to retirement
IT Compliance & SOC 2
- Own the client's IT compliance posture — ensuring all systems, practices, and vendors meet requirements under relevant frameworks including SOC 2 Type II, GDPR, CCPA, and HIPAA where applicable
- Lead and manage SOC 2 audit preparation and coordination — working directly with external auditors, collecting and curating evidence, tracking remediation items, and maintaining audit readiness year-round
- Oversee the implementation and ongoing management of Vanta (or equivalent GRC tooling) for continuous compliance monitoring, control mapping, and evidence collection
- Develop, maintain, and enforce IT security policies, access control procedures, and acceptable use standards across the organisation
- Design and deliver security awareness and IT compliance training programs for employees — ensuring a culture of security consciousness across the client's distributed team
- Prepare for and facilitate both internal and external compliance audits — serving as the primary IT point of contact throughout the audit lifecycle
General Systems Administration
- Administer and support core IT systems including Google Workspace, Microsoft 365, and Microsoft Defender — managing user accounts, groups, permissions, and access controls across platforms
- Provide escalated IT support and troubleshooting for systems, networks, and applications — particularly for issues that have a security or compliance dimension
- Ensure the reliability, availability, and performance of the client's IT infrastructure — proactively monitoring and addressing issues before they impact employees
- Collaborate with engineering, product, and operations teams to support secure system integrations, new tool onboarding, and infrastructure decisions that require IT or security sign-off
- Maintain clear, current documentation of all IT systems, configurations, security controls, and compliance artefacts — on the client's internal knowledge base and SharePoint environment
Skills & Qualifications
- 5–7 years of hands-on experience in IT systems administration, information security, or a combined IT/security role — with demonstrated ownership of security and compliance in a fast-moving technology or SaaS environment
- Direct, hands-on experience with SOC 2 Type II audit preparation and management — including evidence collection, control implementation, auditor coordination, and year-round readiness maintenance
- Proficiency with MDM platforms — Hexnode strongly preferred; Jamf, Intune, or equivalent will be considered — including device policy configuration, enrolment management, and remote administration
- Strong command of Google Workspace administration — user management, group policies, SSO configuration, security settings, and audit log review
- Working proficiency with Microsoft 365 administration and Microsoft Defender — including endpoint security policy management, threat protection configuration, and alerting
- Hands-on experience with GRC and compliance monitoring tools — Vanta, Drata, or equivalent — including control mapping, evidence management, and compliance dashboard oversight
- Solid understanding of firewall management, network security principles, antivirus and EDR solutions, and intrusion detection/prevention systems — with ability to manage and tune these tools independently
- Practical knowledge of GDPR, CCPA, HIPAA, and their implications for a US-based SaaS company managing business communications data
- Strong documentation and communication skills — able to write clear security policies, produce audit-ready evidence packages, and communicate risk clearly to non-technical stakeholders
- Self-directed and proactive — comfortable operating as the sole IT/security resource for an organisation, managing priorities independently and escalating appropriately
Preferred Qualifications
- Relevant certifications — CompTIA Security+, CISSP, CISM, or equivalent — are a strong advantage
- Experience with Vanta specifically, including setup, integrations, test management, and preparing for auditor access
- Familiarity with identity and access management (IAM) tooling — Okta, Google SSO, or Azure AD — and experience implementing or administering SSO and MFA enforcement across a SaaS stack
- Exposure to cloud infrastructure security on AWS or GCP — particularly around access controls, security group configuration, and cloud-native audit logging
- Experience working in a US-headquartered SaaS company or serving as an embedded IT/security resource on behalf of an agency or managed services provider
- Understanding of video communications, data retention, and the specific privacy and security obligations relevant to platforms handling business communication content
How Success is Measured
- SOC 2 Type II audit outcomes — zero critical findings, on-schedule audit completion, and year-round control compliance demonstrated through Vanta or equivalent tooling
- Security incident frequency, severity, and mean time to detect and respond — with a clear trend toward fewer incidents and faster resolution over time
- Patch and update compliance rates — all endpoints and systems at or above policy-defined patching thresholds
- IT asset accuracy — inventory maintained with less than 2% variance from actual fleet at any given time
- New hire IT readiness — equipment provisioned and systems access granted on or before each employee's first day, consistently
- Employee security awareness — measurable improvement in phishing simulation results and policy acknowledgement completion rates over time
- Stakeholder satisfaction — client CTO and leadership team confidence in IT security posture, compliance readiness, and operational reliability
Apply through LinkedIn or send your CV and a short note on your IT support experience to [Confidential Information]