Job Openings Senior Systems Administrator

About the job Senior Systems Administrator

Minimum Requirements:

  • Matric (Grade 12)
  • Bachelors Degree in Computer Science, Information Systems or equivalent
  • Microsoft 365 Certified: Administrator Expert
  • Microsoft 365 Certified: Endpoint Administrator Associate
  • Microsoft Certified: Identity and Access Administrator Associate
  • Microsoft Certified: Information Protection and Compliance
  • Administrator Associate
  • Salesforce Certified Administrator
  • Professional Google Workspace Administrator
  • CompTIA Network
  • CompTIA Security+
  • CompTIA Cloud+
  • 3 - 5 years relevant experience
  • Microsoft Entra ID management of users, groups, and roles
  • Microsoft Entra ID conditional access policies and Identity Protection
  • Microsoft 365 monitoring of security related logs and alerts, on endpoints and identities
  • On-premises Active Directory Domain Services (AD DS) design, deployment, and management
  • On-premises Active Directory Certificate Services (AD CS) configuration and management
  • On-premises endpoint management and configuration using Group Policy
  • Cloud-based endpoint management and configuration of Windows and Mac endpoints, using tools such as Microsoft Intune
  • Salesforce CRM administration and management, including user management and security settings
  • Google Workspace administration and configuration
  • Google Workspace secure configurations
  • Networking design, configuration and management (physical and logical), including routers, switches and firewalls
  • Network monitoring and troubleshooting
  • ITIL processes such as Incident Management, Change Management, and Service Desk operations
  • Scripting languages such as PowerShell, Python, or Bash
  • Automation configuration management, using tools such as Ansible, Puppet, or Chef

Responsibilities:

  • Centrally manage user access and permissions through single sign on (SSO): create, manage, and delete user accounts and groups, across all systems 
  • Company systems following the security principle of least privilege
  • Implement and enforce secure user access controls and security policies
  • Develop and maintain scripts for automating routine tasks and system maintenance
  • Stay updated with the latest industry trends, technologies, and best practices
  • Ensure the efficient and effective operation of internal networks, specifically the  call center and all related components
  • Recommend and plan required improvements
  • Ensure internet speeds are sufficient and stable
  • Ensure regular maintenance, redundancy and recommend and perform upgrades when required
  • Monitor system performance and availability, using tools to track and analyze system metrics
  • Implement automation tools to streamline IT operations
  • Handle escalated technical support requests from the existing support team
  • Promptly address any technical issues in emergency or critical situations
  • Monitor compliance with IT processes and rules
  • Plan and undertake scheduled maintenance and keep maintenance records
  • Troubleshoot software issues and provide support to end-users
  • Ensure IT systems comply with industry standards and regulatory requirements, such as HIPAA, GDPR and SOC 2
  • Act on IT support tickets and requests from employees, if escalated or if there are capacity constraints
  • Enforce and monitor HIPAA and GDPR compliance on desktops
  • Provide technical support and guidance to end-users and other IT staff
  • Work closely with other IT team members, developers, and stakeholders to ensure seamless IT service delivery
  • Participate in IT projects, including planning, execution, and post-implementation support
  • Research and recommend emerging technologies that support the companies growth strategy
  • Adapt communication style to suit different audiences, ensuring effective verbal and written communication
  • Handle complex technical assignments independently, ensuring high-quality work and clear communication
  • Create and maintain detailed documentation, workflows, and supporting materials for systems topology, support, and administrative actions
  • Ensure that QMS guidelines are adhered to
  • Ensure that all supporting documents are kept to date
  • Ensure that all processes are kept relevant
  • Ensure that all Cyber Security related processes are adhered to