Project IT Manager - Bogotá, Colombia - MyPass Global, MyPass Inc

    MyPass Global, MyPass Inc
    MyPass Global, MyPass Inc Bogotá, Colombia

    Encontrado en: Talent CO 2A C2 - hace 1 semana

    Default job background
    Descripción
    MyPass Global is on a mission to empower safe, agile & connected communities. Our vision is to become the industry standard platform of record for workforce management and credentialing.

    Our vision transcends just one industry or geography, it speaks to building a global workforce management & credentialing system that is looked to for best practice in this space.

    Our company values set the standard for the behaviours and mindset we expect from every "MyPasser".


    Our values include:
    BRING OUT THE BESTWe connect and empower people to build a safer future.
    We strive to create a positive and enduring impact, no matter how small.
    CHALLENGE THE NORMWe pursue innovation by practising curiosity and always asking 'why'. We challenge assumptions by seeking opportunities for growth and improvement.
    TREAT PEOPLE WELLWe treat our customers, employees and partners as equals. We foster meaningful relationships through trust, compassion and respect.
    WALK THE WALKWe are accountable for our goals, actions and collective vision. We work with integrity and are true to our word, fostering a culture of open communication.

    Position Purpose StatementThe primary objective of the IT manager role is to establish and oversee thedeployment of MyPass' computer systems, networks, and associated hardwareand software infrastructure.

    This position involves architecting the technicalframework, configuring system settings, and implementing security measures toensure a robust platform for IT administrators.

    Additionally, the IT manager willplay a pivotal role in defining and enforcing information technology securitypolicies and procedures, laying the foundation for efficient operation,maintenance, and overall reliability of the IT environment.

    In summary, the IT Manager role involves strategic oversight, planning, andimplementation of IT infrastructure, security, and policies, ensuring compliancewith industry standards and best practices.

    Key Responsibilities

    Infrastructure Management:
    Oversee the installation, configuration, and maintenance of all company-owned workstations, laptops, and networking equipment.
    Define and implement BYOD policies for non-company devices, ensuring seamless integration with the overall IT framework.
    Monitor the performance of owned hardware, ensuring optimal operation, and execute regular updates and patches for hardware systems.


    User Support and Management:
    Develop and enforce standardized role requirements for each operating system based on 'need-to-know' principles.

    Develop appropriate systems and processes to conduct periodic desktop audits to identify unauthorized data on local and cloud storage drives.

    Provide strategic technical assistance to end-users, resolving hardware and software issues for both company-owned devices and BYOD.Facilitate software installations, updates, and troubleshooting processes.

    Conduct employee training on IT-related procedures and best practices.


    Network Management:
    Oversee and maintain the local area network for the Cebu team.
    Ensure network security by implementing firewalls, VPNs, and other security measures aligned to approved security policies.
    Troubleshoot network connectivity issues as they arise.


    Security Management:


    Develop systems that allow the business to maintain user access controls, overseeing the granting, revocation, and maintenance of appropriate permissions within defined timelines.

    Monitor and respond to security threats and incidents, leading investigation, escalation, remediation, and closure processes.
    Develop, implement, and enforce IT security policies and procedures.
    Update and maintain antivirus and anti-malware solutions.


    Procurement:
    Evaluate and recommend IT hardware and software purchases.
    Manage software licenses to ensure compliance.


    Documentation and Reporting:
    Maintain comprehensive documentation of system configurations, procedures, and user guides.
    Develop and update operations and security standard operating procedures as required.
    Generate and disseminate regular software usage reports, including security alerts, usage and license status, and drive volume.


    IT Policy and Compliance:
    Enforce IT policies and standards to ensure compliance with ISO 27000 standards.
    Stay abreast of industry best practices and emerging technologies.


    Vendor Management:
    Collaborate with external vendors for IT-related services and support.
    Key Accountabilities

    Task (% of time)System Administration - 20%User Support & Management - 10%Security Management - 30%Network management - 10%Documentation & reporting

    • 15%Hardware & Software + Vendor management 10%IT policy & Compliance 5%Information Security Accountabilities

    Management:
    Determine and allocate the resources required to maintain and continuously improve the ISMSEnsure Information Security requirements are communicated and understood across all levels of the businessEnsure business activities support the security of informationPromote the continuous improvement of information security ensure changes to the ISMS are effectively communicated to the business and stakeholders

    Senior Leaders:
    Ensure direct reports receive instructions which adequately describe the responsibilities for information security related to their job roleEnsure direct reports receive training to maintain appropriate information security skills and knowledge required for their job roleEnsure direct reports demonstrate the information security skills and knowledge required for their job roleEnsure induction and training focuses on the most relevant information security aspects for each job roleEmployees:Understand own contribution to the effectiveness of the ISMSUnderstand own responsibilities within the ISMS (e.g. Acceptable of Use Assets Policy, Information Security Policy)Understand the consequences of non-compliance with the requirements of the ISMSUnderstand information security guidelines related to own job roleMeasure of Success

    IT SOPs and policies are consistently reviewed and republished aligned to deadlines;Security alerts are acted on appropriately and within SLAAppropriate access controls are set on all roles and users are offboarded (when required) in a timely fashionInternal Service Levels are met for user onboarding and offboardingInformation Security AccountabilitiesManagement:

    • Determine and allocate the resources required to maintain and continuously improve the ISMS
    • Ensure information Security requirements are communicated and understood across all levels of the business
    • Ensure business activities support the security of information
    • Promote the continuous improvement of information security
    • Ensure changes to the ISMS are effectively communicated to the business and stakeholders

    Senior Leaders:

    • Ensure direct reports receive instructions that adequately describe the responsibilities for information security related to their job role
    • Ensure direct reports receive training to maintain appropriate information security skills and knowledge required for their job role
    • Ensure direct reports demonstrate the information security skills and knowledge required for their job role
    • Ensure induction and training focus on the most relevant information security aspects for each job roleEmployees:
    • Understand own contribution to the effectiveness of the ISMS
    • Understand own responsibilities within the ISMS (e.g. Acceptable of Use Assets Policy, Information Security Policy)
    • Understand the consequences of non-compliance with the requirements of the ISMS
    • Understand information security guidelines related to own job role
    #J-18808-Ljbffr