Manage information technology and computer systems.
Manage IT staff by recruiting, training and coaching employees, communicating job expectations and appraising their performance.
Develop information technology strategies and services in line with the organisations overall strategy and objectives.
Design, develop, implement and coordinate systems, policies and procedures.
Protect and backup vital information of the company using digital management tools and servers.
Act as point of escalation for key stakeholders and resolve issues. Follow up on complaints or inquiries from key stakeholders.
Evaluate current IT capability against potential threats & technological developments and maintain IT security in accordance with set procedures and standards.
Ensure adequate data backup solutions and secured disaster recovery procedures for continuity in operations. Ensuring on-premise server and Cloud base server data security and backups are made on a daily basis including local Area Network.
Implement security solutions for emails and improvise endpoint solutions ensuring protection from all types of phishing/spam emails.
Implementing & managing security systems, such as firewalls, VPNs, data protection controls, patching, encryption, vulnerability scanning, pen testing etc. to protect the network against cyber-attack.
Ensure Log report is maintained for firewalls & VPNs access.
Undertaking monthly training for IT team members on cyber security, Office 365 email system.
Understanding security threats connected with various job functions. Provide all staff with relevant security training through continuous reminders by email and arranging workshops/seminars/training. Taking corrective action if an employee breaks the set security protocols in alliance with the HR Director
Ensure scheduled audits are conducted to be up to speed with the latest security threats e.g., penetration testing, vulnerability assessments, etc.
Ensure all third-party service providers are held to the same security standards as the internal users.
Serving as a point of contact for high-risk vulnerabilities and occurrences. This includes assessing the risk associated with new threats, vulnerabilities, and exploits. Must be able to make decisions about when to inform the senior management about emerging threats and their possible impact on the organizations infrastructure
Mitigate risk of data loss by implementing solid Backup system.