Infrastructure Lead

Posted on 7 Aug, 2018
  • 8 - 10 Years
  • Permanent

Department:

Sub Department:

Report To:

Requisition Number: 
M14856

 

Purpose of Position:

The Infrastructure Manager's role is to plan, organize, and manage staff and overall operations to ensure the stable operation of the organization's IT infrastructure. This includes developing, maintaining, supporting, and optimizing key functional areas, particularly network infrastructure, server infrastructure, data communications, and telecommunications systems. The Infrastructure Manager will also schedule and direct activities to resolve hardware and software problems in a timely and accurate fashion.

Key responsibilities:

  • He/she should be able to resolve day to day IT issues.
  • He/she should provide necessary support to the respective team/ reporting manager.
  • It is his/her responsibility to update the IT asset register.
  • It is his/her responsibility to  provide support to nearby business locations.
  • He/she has to coordination with different vendors.
  • It is his/her responsibility to keep the systems updated regularly (like updating batches, etc.)
  • He/she has to monitor uptime of business locations.
  • Team management
  • He/she should be aware of the latest trends/know how of IT security systems/applications.
  • He/she should be able to monitor software compliances.

Qualification/Skills:

 

Academics: B.E./Equivalent graduation in any discipline with technical background.

Competencies and skills:

  • Basic Communication
  • Assembling Systems
  • Installation of OS / Application
  • Trouble shooting of network issues
  • Configuration of servers
  • Knowledge of TCP/IP,DNS,etc.
  • Manage firewalls.

Additional skills and qualification required:

  •  Exposure to VMware applications.
  •  Exposure to handling storage devices (NAS, etc.)

 

Information Security Competence Required

  • Ability to identify Information security vulnerabilities in Operating Systems, network design, network devices
  • Solution to the vulnerabilities in terms of type of product, manufacturer, brand, product configuration, monitoring and corrective actions
  • Awareness on source of updates on new vulnerabilities, evaluate, corrective actions when needed
  • Hardening of Operating Systems, wireless devices, network devices

Business Enquiries