Senior It Administrator

Year    KA, IN, India

Job Description

Job Overview

The IT Administrator is responsible for overseeing and maintaining the company's IT infrastructure, managing software and hardware resources, ensuring effective cloud solution deployments, coordinating with vendors, and managing the IT budget. This role ensures optimal operation of IT systems, supports company goals, and enhances productivity across departments.

Key Responsibilities

IT Infrastructure Management



o Maintain and monitor all network, server, and IT infrastructure systems.

o Ensure high levels of availability, security, and performance.

o Perform regular system maintenance, updates, and backups.

o Software and Hardware Management

o Install, configure, and maintain hardware (servers, computers, printers, etc.) and software solutions.

o Provide troubleshooting and support for end-users across all hardware and software issues.

o Track and manage hardware and software inventory to ensure proper allocation and upgrades.

1. Cloud Solutions Management

o Deploy, monitor, and manage cloud-based solutions (e.g., AWS, Azure, Google Cloud).

o Ensure cloud resources are secure, cost-effective, and optimized for performance.

o Collaborate with relevant teams to assess and integrate new cloud solutions.

2. Vendor and Supplier Management

o Coordinate with vendors for procurement, installation, and support of IT systems and services.

o Evaluate vendor proposals, negotiate contracts, and ensure timely delivery of services.

o Monitor vendor performance and resolve any related issues.

3. Budget Management

o Develop, monitor, and manage the IT budget, ensuring cost-effectiveness and alignment with company goals.

o Track spending and provide regular financial reports to leadership.

o Identify opportunities for cost savings within IT operations.

4. Cybersecurity

o Implement and maintain security protocols, including firewalls, antivirus, and data encryption.

o Regularly monitor systems for potential threats or breaches and address them promptly.

o Educate employees on cybersecurity best practices and ensure compliance with security policies.

5.

Project Management and Collaboration:



o Work with other departments, such as Development, Security, and Business Units, to ensure IT solutions align with company needs.

o Participate in project planning and provide technical input on IT infrastructure requirements for new projects.

o For automation projects, such as when a UiPath bot goes live, ensure that all infrastructure is secure and compliant with company security policies.

6.

Backup and Disaster Recovery:



o Implement and manage backup solutions for critical systems and data.

o Develop disaster recovery plans and conduct regular tests to ensure data integrity and system availability.

7.

Training and Documentation:



o Provide training to IT staff and end-users on new technologies, best practices, and security protocols.

o Maintain detailed documentation for all systems, processes, and procedures, ensuring that all IT operations are properly recorded and auditable.

8.

Compliance and Policy Enforcement:



o Ensure compliance with all relevant legal, regulatory, and company-specific policies (e.g., GDPR, HIPAA).

o Regularly review and update internal IT policies to stay aligned with industry standards and emerging security threats.

Roles and Responsibilities of Senior IT Admin for Security Hardening



Access Control and User Management

Enforce Least Privilege Access

: Implement the principle of least privilege by ensuring that only authorized personnel have access to RPA bots, Orchestrator, and sensitive systems. Restrict administrative privileges to a limited number of individuals.

Multi-Factor Authentication (MFA)

: Implement MFA for all users accessing the RPA environment to enhance security against unauthorized access.

Credentials and Secrets Management

Credential Vault

: Ensure that all bot credentials and sensitive information are stored securely in a credential vault, such as UiPath Orchestrator's Credential Store or other secure password managers (1password).

Credential Rotation

: Establish and manage regular rotation of credentials, API keys, and service accounts to reduce the risk of credential compromise. Ensure passwords and keys are updated periodically, such as every 90 days.

Avoid Hardcoding Credentials

: Prevent hardcoding of credentials within automation scripts or configuration files to mitigate the risk of exposing sensitive information.

Bot and Virtual Machine Hardening

Operating System Security

: Ensure that all virtual machines (VMs) running RPA bots are hardened. This includes configuring firewalls, disabling unnecessary services and ports, and regularly patching operating systems to fix vulnerabilities.

Bot Execution with Least Privilege

: Ensure that bots execute with the lowest privileges necessary for their tasks. Avoid using high-privileged accounts like root or admin unless absolutely necessary.

VM Security

: Secure VMs by implementing antivirus protection, disabling unnecessary software, and configuring firewalls to only allow traffic from trusted IP addresses.

Network and Communication Security

Encrypted Communication

: Enforce encryption of data in transit between RPA bots, Orchestrator, and other systems. Use secure protocols like HTTPS, TLS, or VPNs for communications.

IP Whitelisting

: Implement IP whitelisting to restrict access to the RPA bot infrastructure only from trusted networks and IP addresses.

VPN/Private Networks

: Ensure that bots access sensitive systems over secure, private networks or VPNs, particularly when interacting with internal systems or databases.

Application and API Security

Hardening Applications

: Work with the relevant teams to ensure the security of any applications or systems that RPA bots interact with. This may include enforcing MFA, limiting API access, and implementing secure authentication mechanisms.

API Security

: Ensure that APIs accessed by bots are secured, including the use of secure authentication protocols, proper authorization checks, and encrypted communication channels.

Audit and Monitoring

Logging and Monitoring

: Enable detailed logging for all bot activities, including successful and failed execution because of VM, changes to configurations, and access to sensitive data. Ensure logs are reviewed periodically for unusual activities.

Real-Time Monitoring

: Implement real-time monitoring tools to track security events, and anomalies in system behavior.

Log Retention and Analysis

: Set up automated retention policies for logs (e.g., 90 days) and perform regular log analysis to identify any potential security incidents.

Backup and Disaster Recovery

Regular Backups

: Ensure that backup processes are in place for critical bot data, configuration files, and logs. Regularly test backups to ensure they can be restored in case of failure.

Disaster Recovery Planning

: Develop and maintain a disaster recovery plan for the RPA infrastructure, including VM recovery and bot restoration, to ensure minimal downtime in case of an incident.

Bot-Specific Security Measures

Bot Behavioral Analysis

: Implement monitoring systems to analyze bot behavior and identify deviations that may indicate a security breach or malfunction. Establish baseline behaviors for normal operations and trigger alerts for anomalies.

Collaboration with Development Teams

Security Reviews for New Bots

: Work with the development team to conduct security reviews of any new RPA processes, ensuring that security best practices are implemented in automation workflows before they go live.

Secure Integration

: Ensure that any integrations with third-party applications or services are secure, and follow best practices for handling API keys, data transmission, and access controls.

Compliance and Regulatory Adherence

Ensure Regulatory Compliance

: Ensure that all RPA implementations comply with relevant regulations such as GDPR, CCPA, or other data protection laws. Work with legal and compliance teams to ensure that bots handle data securely and follow privacy guidelines.

Security Audits and Assessments

: Conduct regular security audits of the RPA environment to identify vulnerabilities and ensure compliance with internal and external security standards.
Key Skills and Qualifications

Educational Requirements

: Bachelor's degree in Information Technology, Computer Science, or a related field.

Experience

: Minimum of 5 years of experience in IT administration, with a focus on infrastructure, cloud solutions, Security Hardening, Data Management, Backups and budget management.

Budgeting Skills

: Proven ability to manage budgets effectively, with experience in cost optimization.

Communication Skills

: Strong verbal and written communication skills, with the ability to present technical information to non-technical audiences.

Problem Solving

: Excellent analytical skills to diagnose and resolve complex IT issues.

Job Types: Full-time, Permanent

Pay: From
590,049.87 per year

Experience:

IT administration : 5 years (Preferred) cloud solutions: 5 years (Preferred)
Work Location: In person

Beware of fraud agents! do not pay money to get a job

MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD4015822
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    KA, IN, India
  • Education
    Not mentioned
  • Experience
    Year