Description
Managing user accounts across different platforms like Windows – Active Directory, UNIX, SAP, RACF etc. Handles User Accounts life cycle pertains to Global/Internal applications Tracks and follow up the requests till closure to ensure completion within agreed SLAs.
Mandatory to have, hands on experience in Creating /Administering user accounts and shared resources in Active Directory/Azure Active Directory
Mandatory to have, hands on experience in Exchange Management Console (EMC): Creating/Managing Mailboxes, Groups Personal folders and other exchange properties. Ability to troubleshoot/resolve issues related to security and permissions pertain to Active Directory and knowledge on group policy / delegation of rights. Good understanding of ITIL processes and ITSM tools.
Working knowledge of ticketing system- Service Now, would be an added advantage. Basic understanding of SOX compliance: Impact and procedures.
Qualifications: Minimum of Bachelor’s degree in Computer Science or related field. .
=========================================================
Ingram Micro touches 80% of the technology you use every day with our focus on Technology Solutions, Cloud, and Commerce and Lifecycle Solutions. With $50 billion in revenue, we have become the world’s largest technology distributor with operations in 64 countries and more than 35,000 associates. Position Summary: Design, install, manage, and implement business plans, policies and procedures to maintain systems, network, database and/or Web security develop, implement, and maintain information security, including access management, vulnerability assessments, penetration testing, infrastructure, and regulatory compliance responsible for reporting, investigation, and resolution of data security incidents analyze business needs and oversee security architecture, administration, and policy planning to lessen possibility of security breach recommend enhancements to plug potential security gaps. Prevent IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction to an organization’s information systems and IT assets and intellectual property including: Designing, testing, and implementing secure operating systems, networks, and databases Password auditing, network based and Web application based vulnerability scanning, virus management, and intrusion detection Conducting risk audits and assessments, providing recommendations for application design. Monitoring and analyzing system access logs Planning for security backup. Provide guidance and direction on best practices for the protection of information ensure compliance with regulations and privacy laws. May oversee internal or external systems security (e.g., cloud services). What you bring to the role: Entry-level professional individual contributor on a project or work team. Work is closely supervised. Problems faced are not typically difficult or complex. Explains facts, policies and practices related to job area. Works on projects of limited scope and complexity. Follows standard practices and procedures in analyzing situations or data from which answers can be readily obtained. Uses company standard policies and procedures to resolve issues in which answers can be readily obtained. Work is reviewed regularly by supervisor or more senior peers. Requires broad theoretical knowledge typically acquired from advanced education. Typically requires a four year college degree or equivalent experience and 0-2 years functional experience. *This is not a complete listing of the job duties. It’s a representation of the things you will be doing, and you may not perform all of these duties.


Source link