Senior Systems Administrator
Job description
Minimum Requirements:
- Matric (Grade 12)
- Bachelors Degree in Computer Science, Information Systems or equivalent
- Microsoft 365 Certified: Administrator Expert
- Microsoft 365 Certified: Endpoint Administrator Associate
- Microsoft Certified: Identity and Access Administrator Associate
- Microsoft Certified: Information Protection and Compliance Administrator Associate
- Salesforce Certified Administrator
- Professional Google Workspace Administrator
- CompTIA Network+
- CompTIA Security+
- CompTIA Cloud+
- 3 - 5 years relevant experience
- Microsoft Entra ID management of users, groups, and roles
- Microsoft Entra ID conditional access policies and Identity Protection
- Microsoft 365 monitoring of security related logs and alerts, on endpoints and identities
- On-premises Active Directory Domain Services (AD DS) design, deployment, and management
- On-premises Active Directory Certificate Services (AD CS) configuration and management
- On-premises endpoint management and configuration using Group Policy
- Cloud-based endpoint management and configuration of Windows and Mac endpoints, using tools such as Microsoft Intune
- Salesforce CRM administration and management, including user management and security settings
- Google Workspace administration and configuration
- Google Workspace secure configurations
- Networking design, configuration and management (physical and logical), including routers, switches and firewalls
- Network monitoring and troubleshooting
- ITIL processes such as Incident Management, Change Management, and Service Desk operations
- Scripting languages such as PowerShell, Python, or Bash
- Automation configuration management, using tools such as Ansible, Puppet, or Chef
Responsibilities:
- Centrally manage user access and permissions through single sign-on (SSO): create, manage, and delete user accounts and groups, across all systems
- Company systems following the security principle of least privilege
- Implement and enforce secure user access controls and security policies
- Develop and maintain scripts for automating routine tasks and system maintenance
- Stay updated with the latest industry trends, technologies, and best practices
- Ensure the efficient and effective operation of internal networks, specifically the call center and all related components
- Recommend and plan required improvements
- Ensure internet speeds are sufficient and stable
- Ensure regular maintenance, redundancy and recommend and perform upgrades when required
- Monitor system performance and availability, using tools to track and analyze system metrics
- Implement automation tools to streamline IT operations
- Handle escalated technical support requests from the existing support team
- Promptly address any technical issues in emergency or critical situations
- Monitor compliance with IT processes and rules
- Plan and undertake scheduled maintenance and keep maintenance records
- Troubleshoot software issues and provide support to end-users
- Ensure IT systems comply with industry standards and regulatory requirements, such as HIPAA, GDPR, and SOC 2
- Act on IT support tickets and requests from employees, if escalated or if there are capacity constraints
- Enforce and monitor HIPAA and GDPR compliance on desktops
- Provide technical support and guidance to end-users and other IT staff
- Work closely with other IT team members, developers, and stakeholders to ensure seamless IT service delivery
- Participate in IT projects, including planning, execution, and post-implementation support
- Research and recommend emerging technologies that support the company's growth strategy
- Adapt communication style to suit different audiences, ensuring effective verbal and written communication
- Handle complex technical assignments independently, ensuring high-quality work and clear communication
- Create and maintain detailed documentation, workflows, and supporting materials for systems topology, support, and administrative actions
- Ensure that QMS guidelines are adhered to
- Ensure that all supporting documents are kept up to date
- Ensure that all processes are kept relevant
- Ensure that all Cyber Security-related processes are adhered to