Job Summary
We are seeking a skilled IT Systems Administrator to join our team. This individual will be responsible for managing and maintaining our internal systems infrastructure, ensuring smooth operations and compliance with security policies.
Key Responsibilities:
* System Administration: Configure and administer Microsoft 365 services, including user accounts, security groups, SharePoint, Teams, Exchange, and OneDrive
* Jira Management: Manage and optimize Jira workflows, permissions, and user roles to ensure optimal usage across teams
* Access Control: Implement and manage access permissions for internal systems, ensuring users have the appropriate level of access based on their roles and responsibilities
* Single Sign-On (SSO): Set up and maintain SSO solutions across systems, including Microsoft Azure AD, ensuring smooth authentication processes for users
* Security Enforcement: Enforce security policies, including password policies, multi-factor authentication (MFA), and encryption standards, in accordance with best practices and regulatory requirements
* Employee Onboarding/Offboarding: Ensure efficient and secure processes for onboarding and offboarding employees, including creating user accounts, assigning roles, and revoking access when necessary
* System Monitoring: Monitor system logs and perform regular audits to ensure compliance with security policies. Respond to and mitigate security incidents
Requirements:
* Education: Bachelor's degree in Information Technology, Computer Science, or a related field
* Experience: 3+ years of experience in system administration or IT systems configuration
* Microsoft 365 Expertise: Expertise in Microsoft 365 administration including Exchange Online, Teams, SharePoint, and OneDrive
* Jira Administration: Experience in Jira administration (user roles, permissions, and workflow configurations)
* SSO Technologies: Strong knowledge of SSO technologies, particularly Microsoft Azure AD and other identity management platforms
* Access Control Policies: Familiarity with access control policies and user lifecycle management (provisioning, de-provisioning)