Specific duties and responsibilities of this position shall include but not be limited to the following:
IT Operations and Management
- Systems Administration: Manages IT systems and applications throughout their lifecycle, including deployment, configuration, patching, monitoring, and decommissioning. Monitors system performance, availability, and security. Installs and maintains upgrades and patches to ensure systems are secure, current, and operating efficiently. Documents system configurations and procedures, and recommends improvements to enhance reliability, security, and operational efficiency.
- Asset Management: Serves as the primary point of contact and manages third-party vendors and contractors delivering IT equipment and services. Manages and maintains contracts for the procurement of IT services, hardware, applications, and software. Oversees IT asset management for computers, software, mobile devices, desktop phones, and other equipment, ensuring assets are properly tagged, recorded, tracked, and licensed. Schedules and coordinates repairs or replacements of IT equipment as needed.
- Governance: Develop and implement IT policies and procedures. Ensures compliance with data governance standards and implements industry best practices. Monitors and ensures staff adherence to IT governance frameworks, policies, and procedures. Provides strategic advice on IT investments to ensure alignment with MHF’s objectives.
User Support and Customer Service
- Technical Assistance and Troubleshooting: Provides first-line technical support to staff, answers, evaluates, and prioritizes helpdesk requests for assistance from users experiencing problems with hardware, software, applications, networking, and other computer-related technologies. Responsible for employee IT onboarding and offboarding, including user account creation and deactivation, access provisioning, hardware setup, software and application installation, and password resets. Escalates problems to specialized vendors when needed.
- Training and User Education: Provide training and guidance to staff on computer systems, software applications, and IT best practices. Educates staff on cybersecurity awareness, safe computing practices, and data protection policies.
Security and Risk Management
- Risk Assessment and Access Control: Assess security risks to data, systems, and implement controls to mitigate risks. Monitor and manage user identity, access, credentials, and system permissions to ensure data security and regulatory compliance. Support the implementation and maintenance of IT security measures.
- Data Protection and Threat Prevention: Maintains data protection and retention practices, including backups, access audits, and recovery support. Install, test, and operate security tools such as antivirus and threat detection/prevention systems. Monitor, report, and respond to potential cyberattacks, unauthorized access to IT systems, and any of loss or disclosure of personal information.
- Compliance, Privacy & Safety: Participates in various internal committees, meetings and initiatives. Ensures compliance to the protection of privacy and health and safety by being compliant to policies, goals, standards, practices, procedures, rules and legislation. Assists in monitoring and maintaining compliance with information security policies, data protection and retention standards, protection of privacy, and regulatory requirements to minimize organizational risk and ensure operational integrity. Oversees the responsible implementation of AI tools within the organization, ensuring alignment with compliance, privacy, and safety.