What are the responsibilities and job description for the Information Technology Manager position at UNCAS INTERNATIONAL?
Job Description
Information Technology Manager – Job Description
Job Summary:
The Information Technology Manager is responsible for overseeing the integration of planning, project management, technology implementation, capacity planning, and system and process controls for networking and computing services to meet or exceed customer expectations. This role acts as a central point of contact for various departments while managing multiple projects and vendor relationships. Additionally, the IT Manager is accountable for the ongoing management of the IT team, IT vendors, information security policies, and technical systems, ensuring the confidentiality, integrity, and availability of all organizational healthcare information systems.
Key Responsibilities
Company Description
Private Company
Private Company
Information Technology Manager – Job Description
Job Summary:
The Information Technology Manager is responsible for overseeing the integration of planning, project management, technology implementation, capacity planning, and system and process controls for networking and computing services to meet or exceed customer expectations. This role acts as a central point of contact for various departments while managing multiple projects and vendor relationships. Additionally, the IT Manager is accountable for the ongoing management of the IT team, IT vendors, information security policies, and technical systems, ensuring the confidentiality, integrity, and availability of all organizational healthcare information systems.
Key Responsibilities
- Hardware Maintenance and Support
- Hardware Lifecycle Management
- Oversee the procurement, installation, configuration, and decommissioning of hardware systems.
- Ensure hardware meets organizational standards and aligns with operational needs.
- Manage hardware asset inventory, ensuring proper cataloging and tracking throughout the lifecycle.
- Conduct audits to ensure compliance with asset management policies and standards.
- Preventive Maintenance
- Develop and implement preventive maintenance schedules to minimize downtime and extend the lifespan of critical hardware.
- Perform regular diagnostic checks on servers, workstations, network devices, and other hardware components.
- Coordinate the timely replacement of outdated hardware.
- Troubleshooting and Incident Resolution
- Provide hands-on support for troubleshooting hardware issues, including servers, workstations, and network devices.
- Lead hardware failure resolution efforts, minimizing operational disruption.
- Collaborate with vendors and manufacturers for warranty and service agreements to address complex hardware issues.
- Vendor Management and Coordination
- Establish and maintain relationships with hardware vendors to ensure timely repairs, upgrades, and support.
- Evaluate and recommend third-party maintenance contracts for cost-effective hardware support.
- Manage hardware warranty claims, ensuring repairs and replacements are completed promptly.
- Hardware Configuration and Setup
- Lead the configuration, setup, and deployment of new hardware, ensuring compatibility with existing systems.
- Coordinate the installation of hardware systems, including servers, routers, and desktop devices, ensuring proper functionality.
- Ensure hardware is configured in compliance with organizational security protocols.
- Performance Monitoring and Reporting
- Monitor hardware performance through diagnostic tools and metrics.
- Generate and review reports to identify trends, areas for improvement, and potential risks.
- Provide regular updates to management on hardware performance and necessary upgrades.
- System Backups and Disaster Recovery
- Ensure critical hardware systems are included in regular backup procedures and disaster recovery plans.
- Coordinate hardware testing for disaster recovery exercises to ensure quick recovery in case of failure.
- User Support and Training
- Provide technical support to end-users regarding hardware issues and troubleshooting.
- Develop and deliver training materials related to hardware maintenance and best practices.
- Assist users with hardware setup and basic troubleshooting procedures.
- Hardware Security and Compliance
- Secure hardware systems through physical and network security measures.
- Regularly review and update security protocols for hardware to meet regulatory and privacy standards.
- Implement device encryption, access control, and other security measures to protect sensitive data.
- Mobile Device Management
- Support mobile devices working with third-party vendors to configure, support and deploy mobile devices for the company.
- Manage and configure the mobile-device-management system.
- Environmental Sustainability and Disposal
- Oversee the responsible disposal and recycling of outdated hardware in compliance with environmental standards.
- Collaborate with certified e-waste vendors to ensure safe and secure disposal of hardware components.
- Ensure proper wiping of sensitive data from hardware before disposal.
- Information Security Compliance Assessment, Audit, and Monitoring
- Plan and execute information security compliance projects, identifying risks and gaps in operations.
- Conduct on-site inspections and assessments, ensuring compliance with security policies.
- Lead investigations into security incidents, correlate events, document findings, and collaborate with other teams.
- Generate reports on the status of information security compliance and propose remediation strategies.
- Serve as an information security resource for various platforms and protocols, including Microsoft Windows, Linux, firewalls, and mobile device encryption.
- Stay updated on best practices and emerging technologies in information security.
- Assist the Chief Information Officer (CIO) in responding to security incidents.
- Project Management and Vendor Relations
- Develop and maintain detailed project plans for IT initiatives, managing tasks, and coordinating with vendors.
- Oversee the organization and maintenance of site documentation, ensuring accuracy and currency.
- Manage vendor relationships, ensuring that deliverables meet business needs and are completed on time.
- Training and Development
- Conduct organization-wide information security training as needed.
- Research and develop training materials such as presentations, security bulletins, and web content.
- Recommend security strategies and assessments that comply with regulations and internal policies.
- Leadership and Staff Management
- Lead, motivate, and empower the IT team to ensure successful task completion.
- Coordinate with other departments regarding hardware/software budgeting, acquisition, and maintenance.
- Manage the development and support of WANs and LANs, ensuring system integrity.
- Oversee the implementation of new technologies and software to meet business requirements.
- Conduct monthly reviews of IT performance with the executive team and recommend improvements.
- Administrative Responsibilities
- Ensure staff coverage during illness, vacations, or training.
- Perform all duties in alignment with enterprise policies and performance standards.
- Oversee staff training, supervision, and evaluation, including hiring and termination processes.
- Provide onsite support during natural disasters or other emergencies.
- Travel and Logistics
- Travel up to 50% within a 60-mile radius of the primary location may be required. Reliable transportation is necessary.
- Bachelor’s degree in Computer Science, Mathematics, Healthcare, Finance, Business Administration, or related field; or equivalent experience.
- At least 5 years of experience in information technology, with 5 years in a management role.
- Strong verbal, presentation and written communication skills.
- A minimum of 2 years of experience in Information Security.
- Information Security certification is preferred.
- Knowledge of information security issues and best practices.
- Strong analytical skills to assess and address security gaps.
- Experience with security auditing and compliance.
- Knowledge of privacy regulations such as PCI, NIST, ISO, and HIPAA.
- Ability to manage projects and vendor relationships effectively.
- Ability to communicate technical concepts to both technical and non-technical audiences.
Company Description
Private Company
Private Company