
1. install and configure database management systems (DBMS) software and related tools. 2. perform regular maintenance tasks, such as backups, updates, and performance tuning, to ensure optimal database operation. 3. implement and maintain database security measures to protect sensitive data from unauthorised access and breaches. 4. develop and implement backup and recovery strategies to ensure data integrity and availability in case of database failures or disasters. 5. monitor database performance and capacity to ensure scalability and efficiency. 6. optimise database queries and schema design to improve application performance. 7. collaborate with developers to design and implement database solutions that meet application requirements. 8. troubleshoot database issues and provide timely resolution to minimise downtime. 9. document database configurations, processes, and procedures. stay updated on database technologies and best practices to recommend and implement improvements.
1. Respond to IT support requests from end-users via phone, email, or ticketing system, ensuring prompt and courteous service. 2. Diagnose and troubleshoot basic hardware and software issues, including desktops, laptops, printers, and mobile devices. 3. Provide assistance with software installations, configurations, and updates for standard applications and operating systems. 4. Reset passwords and manage user accounts within Active Directory and other IT systems. 5. Document and track all support activities and resolutions in the IT service management system. 6. Escalate unresolved issues to Level 2 support and provide detailed information for further investigation.
1. Conduct risk assessments and vulnerability scans to identify potential IT security risks and vulnerabilities. 2. Develop and implement strategies and controls to mitigate IT risks, ensuring compliance with industry standards and regulatory requirements. 3. Develop and maintain incident response plans to address IT security breaches and minimise potential damage. 4. Monitor IT systems for security breaches or policy violations, and prepare reports for management detailing risk assessment findings and mitigation activities. 5. evaluate and recommend cybersecurity technologies and tools to enhance IT risk management capabilities. 6. conduct gap analyses to identify deficiencies in existing risk management practices and propose remediation measures. 7. collaborate with legal and compliance teams to ensure IT risk management practices align with legal requirements and contractual obligations. 8. facilitate external audits and assessments to validate the effectiveness of IT risk management controls and procedures. 9. lead incident response exercises and simulations to test the readiness and effectiveness of incident response plans.
1. develop and implement information security strategies and programs to protect organisational data and systems. 2. conduct regular risk assessments and develop risk management plans to mitigate security threats and vulnerabilities. 3. develop and oversee incident response plans and procedures to address security incidents promptly and effectively. 4. ensure compliance with relevant security standards, regulations, and laws through audits, assessments, and continuous monitoring. 5. collaborate with executive management to align information security initiatives with business objectives and priorities. 6. manage and mentor a team of cybersecurity professionals, providing guidance and support in security operations. 7. monitor emerging threats and trends in cybersecurity, implementing proactive measures to safeguard against potential risks. 8. evaluate and recommend security technologies, tools, and solutions to enhance the organisation's security posture. 9. conduct security awareness training and education programs for employees to promote a culture of cybersecurity awareness. 10. prepare and present regular reports on the organisation's security status, incidents, and mitigation efforts.
1. configure and maintain network hardware, including routers, switches, and firewalls, to ensure smooth operation. 2. implement and monitor security measures to protect the network from unauthorised access and cyber threats. 3. diagnose and resolve network problems, such as connectivity issues and performance bottlenecks, to minimise downtime. 4. monitor network performance and optimise network configurations to ensure efficient and reliable operation. 5. plan and execute network upgrades and expansions to accommodate growth and new technologies. 6. collaborate with IT teams to design and implement network solutions that align with organisational goals. 7. conduct regular audits of network infrastructure to ensure compliance with security policies and regulations. 8. provide technical support and guidance to end-users on network-related issues and configurations. 9. maintain documentation of network configurations, processes, and procedures. 10. stay updated on network technologies and best practices to recommend and implement improvements.
1. install and configure operating systems and software applications on servers and workstations. 2. perform routine maintenance tasks, such as backups, patches, and updates, to ensure system reliability and security. 3. provide technical support to users, including troubleshooting hardware and software issues and resolving technical problems. 4. monitor system performance and optimise system configurations to ensure efficient and reliable operation. 5. manage and maintain virtualised environments and cloud infrastructure to support business operations. 6. implement and enforce security measures to protect systems from cyber threats and unauthorised access. 7. automate routine tasks and processes using scripting languages and configuration management tools. 8. collaborate with IT teams to design and implement infrastructure projects and system upgrades. 9. document system configurations, procedures, and troubleshooting steps for knowledge sharing. 10. stay informed about emerging technologies and best practices in systems administration.

