Information Technology Administrator

LAREDO, TX

WORKFORCE SOLUTIONS FOR SOUTH TEXAS (WSST) POSITION DESCRIPTION

 

WSST Job Title: Information Technology Administrator

FLSA Status: Non-Exempt 

Classification: Full-Time 

Supervisor: Deputy Director

State Comparison Title: System Administrator

State Grade: B20

GENERAL DESCRIPTION

Performs highly complex (senior-level) computers systems support work. IT lead position provides information technology support to Workforce Solutions for South Texas (WSST) contractor and board staff. Work involves overseeing the daily activities and coordinating the upkeep, configuration, and reliable operation of systems. Works directly with computer hardware and software, including installation, maintenance, and data recovery. Installs and upgrades computer components and system software. Manage agency servers, resolve problems with computer systems, evaluate and optimize a system for effective performance and provide routine automation. Work involves overseeing WSST information technology systems and network, or mainframe environment. May supervise the work of others.

Serves as first line of defense in cybersecurity. Installation hardware and software, and participate in research and development to continuously improve and keep up with the IT business needs. Actively resolve problems and issues with computer and server systems to limit work disruptions.

Responsible to proactively prevent breaches of all sizes (cybersecurity), understand when they occur, and take immediate steps to remediate them. In this role, the Information Technology Administrator will help keep cybercrime at bay, using expertise and analytics to monitor our data at all points of contact, ferret out malware and ransomware events, and recommend solutions for any vulnerabilities.

Works under limited supervision, with considerable latitude for the use of initiative and independent judgment.

EXAMPLES OF WORK PERFORMED

 

  • Collaborate with other members of the cybersecurity team to develop new protocols, layers of protection, and other proactive and defensive systems for remaining ahead of cybercriminals
  • Responds to incident and problem calls, and processes service request and tasks.
  • Coordinates the system software or hardware needs required to configure and modify systems.
  • Installs, configures, maintains, and administers servers, operating systems, and applications.
  • Determines operational, technical, and system requirements for the location, installation, operation and maintenance of data processing, data communication, system software and server hardware.
  • Coordinates the preparation and maintenance of operating procedures for technical support, troubleshooting, maintenance, and innovative systems administration techniques.
  • Coordinates the installation, configuration, maintenance, and administration of servers, operating systems, and applications.
  • •Add users to network.
  • •Defines and manages the roles and access privileges of individual network entities users and devices to a variety of applications to prevent unauthorized access.
  • •Oversees the completion of projects, and in performing systems software and hardware reviews.
  • •May provide technical support and perform research for information technology systems processes associated with systems software and hardware technology planning, development, implementation, security, and interfaces.
  • •Ensures that appropriate security controls over software are maintained.
  • •Recommends to management systems technology solutions and enterprise-related hardware and software standards.
  • •Reviews and makes suggestions regarding the procurement of information technology equipment.

•          Maintain documentation of security guidelines, procedures, standards, and controls.

•          Maintain knowledge of current cybercrime tactics.

•          May monitor the interface of systems, subsystems, and software applications.

•          Manage desktop and mobile equipment.

•          Prepares briefings, reports and evaluations on systems efficiency and utilization.

•          Ability to lift heavy equipment up to 50 pounds

•          Ability to travel between office locations and to support customers

•          Performs related work as assigned.

GENERAL QUALIFICATION GUIDELINES

Experience and Education

 

Experience in computer systems administration and support work. Graduation from an accredited four-year college or university with major coursework in computer science, management information systems, or a related field is generally preferred. Cybersecurity experience/training or education. Knowledge of incident response processes preferred. Education and experience may be substituted for one another.

Knowledge, Skills, and Abilities

Knowledge of the practices, principles, and techniques of computer operations; of information systems; of computer software and hardware; of information security policies and procedures; of local and wide area networks; and of the management information systems.

Knowledge of systems administration, of computer hardware and software configuration and troubleshooting, of operating systems and applications, of computer programming and architecture of scripting languages, and of basic Internet security administration.

Skill in the use and support of computers, in the use of applicable programs and systems, and in troubleshooting information systems.

Skill in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems. Experience in NIST cybersecurity framework preferred.

Ability to recognize, analyze, and resolve complex technical issues; to learn and use network management, administration, and other systems administration tools, and to communicate effectively.

Ability to operate information technology systems, to troubleshoot equipment, to communicate effectively, and to supervise the work of others.

Registration, Certification, or Licensure

 

May require registration, certification, or licensure in a specialty area. Valid driver's license and proof of liability insurance.

Equipment- Staff required to operate the following:

 

Computer, keyboards, printers, fax machines, modem, telephone, calculator, copying machine.