About the Role
The role involves managing and supporting enterprise systems, troubleshooting technical issues, implementing security measures, and ensuring reliable operation of computing environments.
Responsibilities
- Monitor system performance and resolve incidents promptly
- Maintain server infrastructure across physical and virtual platforms
- Implement and manage backup and disaster recovery procedures
- Ensure network reliability and troubleshoot connectivity issues
- Apply security patches and enforce compliance standards
- Support cloud-based services and infrastructure
- Configure and manage user accounts and access permissions
- Document system configurations and operational procedures
- Perform capacity planning and system upgrades
- Collaborate with technical teams to resolve complex issues
- Administer firewalls and intrusion detection systems
- Manage domain services and directory systems
- Deploy software updates across environments
- Optimize system performance and resource utilization
- Respond to service outages and perform root cause analysis
- Maintain virtualization platforms such as VMware or Hyper-V
- Support email and collaboration platforms
- Enforce data protection and retention policies
- Participate in on-call rotation for critical systems
- Evaluate new technologies for integration into existing infrastructure
- Ensure adherence to change management protocols
- Conduct regular system audits and vulnerability assessments
- Assist in migration projects involving data or platforms
- Provide technical guidance to junior staff
- Maintain accurate inventory of hardware and software assets
Compensation
Competitive salary with performance-based incentives
Work Arrangement
Hybrid work model with flexible hours
Team
Collaborative IT operations team supporting internal and customer-facing systems
On-Call Expectations
- Team members rotate through on-call duties to support critical systems outside business hours
- Incident response requires timely acknowledgment and resolution within defined SLAs
Professional Development
- Opportunities for training, certification reimbursement, and conference attendance
- Internal mentorship programs and technical workshops available
Security Protocols
- All administrators follow strict access control policies
- Regular security audits and penetration testing are conducted
Available for qualified candidates