Well, sort of. The super-user idea in Unix is pretty awful for a securely managed system. It's great for a personal or departmental computer, but for a larger shared system it misses a lot. Many other big operating systems divide up the various roles instead of having an all-or-nothing administrator. You assign particular roles or duties. Ie, ability to kill processes or close network connections could be one role, and someone with that role can simultaneously be disallowed from reading someone else's files. Junior admins get a limited set of privileges, senior admins get more privileges, and no one individually has access to all privileges.
My first post-college job was with the administration group for VMS machines, and while I could do some things (nightly backups) I was disallowed from most activities. When someone went on vacation I would temporarily become the admin and get a few more temporary privileges. There was no way for me as an individual to grab total control without either cracking into the system or physically interacting with the machine in the machine room (and the machine had a key as well that I would have needed for console access). To do my job I never switched to a different account with higher privileges, instead I would request higher privileges during an operation; thus any action I did was always logged with my own ID.
Whereas when I did some Unix admin later in the same job it was completely different. "Su" into a different account than my own, even for many basic operations. It was much easier to make big mistakes. To get the sort of finer grained control you'd create new accounts and put add them into particular groups (ie, users allowed to use tape drives), or you'd use some newer Unix features with Access Control Lists, but all of that was basically about file permission only. If you needed to kill someone else's runaway task or even merely lower its priority you would need to be root. Set-uid programs were how you got around a lot of this and simulated finer grained control but it felt clumsy compared to a system that had security ideas built in from the start.