- Actively participate in and is accountable to assigned work teams.
- Act as the IT technical support person for all assigned application(s).
- Perform initial analysis of the end-users application requests (prepare New Software Request Implementation Project Plan, Statement of Work, Business Case, etc).
- Participate in solutions/products technical evaluation and report system technical issues to application team.
- Follow-up with vendor on day-to-day system issues.
- Develop technical and functional expertise of the application.
- Actively participate in applications implementation process including applications installation, configuration and testing.
- Participate in the testing and certification for features' compliance.
- Perform quality check on basic data set-up to identify any technical problems.
- Co-ordinate and assist the setting of IT facilities and end-user client environment.
- Prepare training material and end-user operating guides.
- Conduct applications' user training for new users or refresher training for existing users.
- Produce and develop reports requested by users or management.
- Evaluate user requests for changes and recommends additional desired functions and reports.
- Assist end users in defining business requirements and prepare business case.
- Continuously monitor and evaluate opportunities for technological enhancements
- Monitor and maintain all assigned applications.
- Diagnose applications faults and solve technical problems either over the phone or in person.
Information Security Responsibilities:
- Comply with all information security policies, procedures & guidelines of DHA as applicable.
- Liaison with all concerned personnel for achieving and maintaining full compliance with the IS Security Policies, Procedures & Guidelines
- Promote Information Security awareness and help build security culture
- Report security incidents or potential events or other security risk to the organization to the concerned
- Protect information assets from unauthorized access, disclosure, modification, destruction.
Qualifications
Bachelors in Information Security, Science in Cybersecurity Information Technology or a related field