Provides technical solutions to complex problems that require ingenuity and creativity.
Establishes and implements security requirements.
Promotes security awareness to mitigate security risks.
Establishes safeguards to protect information against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Confers with senior personnel, users and outside vendors to discuss issues such as computer data access needs.
Monitors information security reports to analyze current threats and ensure implementation of approved security measures.
Identifies and installs patches, modified security files, control files and data access and corrects errors.
Manages users system access to meet security requirements, performs risk assessments and tests information processing systems to ensure correct functioning of data processing activities and security measures.
Implements hardware and software security measures for transmission and storage of information.
Documents computer security and emergency measures, policies, procedures and tests.
Leads, mentors and trains others in the implementation of security and access management.
Oversees system monitoring using approved tools and processes to validate system health.
Analyzes system resource trends and gathers customer requirements for capacity planning.
Validates backup and restore processes against requirements and recommends improvements as required.
Defines and maintains disaster recovery procedures to ensure business continuity.
Actively participates in and validates the design of the delivery system to meet customer requirements.
Collaborates with senior personnel on system integration, hardware and software installation, configuration and disposition of servers and workstations to support the architecture.
Ensures collection, verification, and reporting of IT infrastructure information across distributed systems and multiple support groups.
Manages baseline configurations.
Initiates change requests in accordance with established change procedures to assure compliance with baseline configuration.
Plans and coordinates system changes by using standardized methods and procedures for efficient and prompt handling of all changes to improve day-to-day operations.
Performs risk assessments to minimize change impact.
Leads, mentors and trains others in change management processes.
Participates in root cause analysis and any follow on corrective action.
Mentors, leads and trains other system administrators in problem management.
Acts as mentor for Technical Support - Helpdesk (all levels), System Administrators I, II & III.
Exercises considerable latitude in determining technical objectives of assignment.
Completed work is reviewed for desired results from a relatively long-term perspective.
Performs computing delivery system integration, hardware and software installation, configuration, and disposition of Network systems to support the architecture.
Provides problem resolution and technical support for delivery systems.
Provides support for the design, validation, and configuration management of computing delivery systems. Administers system access to meet security requirements.
Provides complex problem resolution, root cause analysis and technical support for delivery systems.
Plans and coordinates system changes.
Administers system access and establishes safeguards to protect information to meet security requirements. Oversees activities to monitor system performance to support capacity planning, backup and disaster recovery planning.
Other duties as assigned.
|