- Taking charge of processes, procedures, and operational management related to system security and disaster recovery planning.
- Coordinating with security vendors, suppliers, service providers, and external resources; analyzing, recommending, installing, and maintaining software security applications; and monitoring contractual obligations, performance, and service level agreements.
- Troubleshooting and providing support for diagnosing, resolving, and repairing server-related hardware and software issues, including workstations and communication infrastructure.
- Preparing and maintaining documentation, policies, and instructions, and detailing operational procedures and system logs.
- Ensuring the computer site design allows all components to integrate and function correctly, while monitoring and optimizing network performance.
- Continuously evaluating the current computer site to determine future network needs and recommending enhancements for future server and network implementations.
- Establishing, managing, and administering the organization's ICT security policies and procedures to ensure preventive and recovery strategies are implemented, thereby minimizing the risk of internal and external security threats.
- Coordinating with security vendors, suppliers, service providers, and external resources; analyzing, recommending, installing, and maintaining software security applications; and monitoring contractual obligations, performance, and service level agreements.
- Troubleshooting and providing support for diagnosing, resolving, and repairing server-related hardware and software issues, including workstations and communication infrastructure.
- Preparing and maintaining documentation, policies, and instructions, and detailing operational procedures and system logs.
- Ensuring the computer site design allows all components to integrate and function correctly, while monitoring and optimizing network performance.
- Continuously evaluating the current computer site to determine future network needs and recommending enhancements for future server and network implementations.
- Establishing, managing, and administering the organization's ICT security policies and procedures to ensure preventive and recovery strategies are implemented, thereby minimizing the risk of internal and external security threats.