Job Description
- Provide technical support and maintenance for (Desktops, Laptop, Windows, macOS, Printers, Conference systems, Firewall, Internet, AP, Wi-Fi, Switches, CCTV, Door access, E-mail, Anti-virus, Networks, Security Monitoring tools etc.)
- Setting up new users’ accounts (Microsoft 365, Teams, SharePoint, AD, VPN, etc.) and computers with appropriate software and access according to request.
- Provide onboarding and offboarding processes (IT equipment, Process and Walkthrough) to improve end-user experience.
- Identify computer or IT equipment needs (Create and submit the budget, Evaluate, and select suppliers, and Purchase orders).
- Manage IT assets (Receiving, Storing, Tracking, Disposal, and Filing).
- Develop, enhance, and enforce the Company IT security policies and procedures.
- Assist in developing holistic security measures to protect in-house and customer Cloud hosting environments.
- Review organization regulatory / security compliance requirements and implement changes to close the gap.
- Routine server capacity status checking and system application log checking and config backup.
- Oversee user identity and access management, and detect unauthorized access and permissions abused by authorized users.
- Planning and coordinating with the relevant department for infrastructure (Network and Window) periodic maintenance.
- Required standby support after office hours and work on weekends during periodic maintenance.
- Responsible for new office setup (Equipment and Network setup) and performing preventive maintenance and calibration.
- Create user guidelines (SOP) for frequent problems occurred.
- Review and provide expertise on technical support-related processes and documentation for continuous improvement.
- Provide oversight, coaching, and guidance to junior IT Support.
- Ad hoc tasks assigned by the Superior or HOD.
What we are looking for
- Minimum 4 years of working experience in cyber security, computer operations and data network support or maintenance
- Working knowledge of cyber security frameworks, compliance, and regulations (e.g., GDPR, NIST, ISO, etc.)
- Preferred certifications include Microsoft Certified: Azure Administrator Associate/Security Administrator Associate, Certified Information Systems Security Professional (CISSP), CompTIA Security+/ CySA+, Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH)
- Windows servers and clients, Hyper-V, Office365, Active Directory & GPO
- Cloud IaaS/SaaS platforms such as Microsoft Azure and AWS
- Networking technologies such as DNS, DHCP, FTPS, VLAN, WAN
- Firewall, WAF, Azure NSG, web proxy, WAN optimizer, load balancer
- Endpoint protection, EDR, Threat Intelligence, SIEM
- IAM, SSO, PAM, DLP and DRM