Apply for this job

Email *

Job Description

The successful candidate will own the following responsibilities:

• IT access provisioning: The process of granting new employees access to the systems, applications, and data they need to perform their job duties. To ensure that new joiner access is provisioned in a timely manner by coordinating with outsourced IT Management team and arrange the system and accesses typically before the first day of their employment.
• IT access de-provisioning: To remove access for leavers on the last working day at our organization and ensure that former employees do not retain access to sensitive company information or systems that could be used maliciously or accidentally.
• IT Inventory: Maintain the IT inventory accurately and submit the IT inventory reports on a periodic basis for Manager’s review.
• IT Support: Provide assistance to the manager / Head of IT on SharePoint access provisioning and managing any related issues. Also, ensure the timely provisioning and de-provisioning of Oracle NetSuite ERP access.
• Obtaining IT Quotes: Responsible for obtaining the required IT quotes from various vendors based on the Firm’s specific requirements.
• Phishing simulation test: Perform periodic phishing simulation tests for internal staff members to assess their susceptibility to phishing attacks.
• Mitigate the monthly IT network vulnerabilities: Ensure system security by coordinating with the IT Admin team and proactively mitigating the reported monthly vulnerabilities.
• Assisting in risk assessments: Support the Internal IT team in identifying, assessing, and evaluating potential risks associated with IT operations and systems. This could involve researching risk assessment methodologies, collecting data, and conducting interviews with vendors and internal teams.
• Documenting findings: Assist in documenting risk assessment findings and recommendations for improvement. This could involve creating reports, presentations, or other documentation to communicate the results of your analysis.
• Analyzing IT security policies and procedures: Review existing IT security policies and procedures and identify gaps or areas for improvement. Also, assist in developing new policies or updating existing ones.
• Learning about risk management: Opportunity to learn about different types of risks, risk assessment methodologies, and best practices in risk management. Attend training sessions or participate in other educational opportunities to further your knowledge.