LBS is a community of people committed to creating and transmitting management and business knowledge based on a Christian conception of the human person and of economic activity and relevant to Nigeria and Africa at large. We strive to be a world-class business school which will have a significant impact on the practice of management. In order to achieve this mission the School seeks to: Provide high potential professionals with a general management education which stresses professional ethics and service to the community through the practice of management. Have a positive impact on the professional and ethical standards of business management in Nigeria Make intellectual contributions which: a) support the practice of management; b) contribute to the advancement of the management disciplines; and c) create high quality teaching materials. Our Values LBS, as a management development institution, holds a position of trust and confidence with an ever-increasing number of corporate clients and individuals. Therefore, the values we internalise are integrity, professionalism, spirit of service, mutual respect and community.
PURPOSE OF PISITION:
Responsible for securing and protecting the organization’s endpoints, including desktops, laptops, smartphones, and IoT devices. This involves identifying and mitigating risks to prevent unauthorized access and data breaches. Additionally, the role provides second-level technical and administrative support to ensure the efficient use of ICT solutions and services.
ESSENTIAL DUTIES/KEY JOB ROLES AND RESPONSIBILITIES include but are not limited to the following:
- Endpoint Monitoring: Responsible for monitoring and maintaining the performance and security of endpoint devices (including desktops, laptops, mobile phones, etc.). This includes analyzing system logs and performance data to detect anomalies and potential issues.
- Patch Management: Manage and apply software patches and updates to endpoint devices. This includes identifying applicable patches, testing their compatibility, and deploying them promptly to enhance performance and security.
- Endpoint Configuration and Maintenance: Responsible for configuring and maintaining endpoint devices according to organizational standards. This includes installing operating systems and software, managing software licenses, and applying necessary updates and patches.
- Documentation and Reporting: Responsible for maintaining accurate documentation of endpoint configurations, troubleshooting procedures, and incident resolutions. This may also include providing periodic reports on performance, security incidents, and improvement recommendations.
- User Support and Training: Manage user security awareness training platforms and assists end-users with technical support, troubleshooting, and guidance on using their endpoint devices effectively. This may include training sessions or creating user guides to enhance users’ understanding of device functionality.
- Endpoint Inventory Management: Maintains an up-to-date inventory of all endpoint devices within the organisation. This includes tracking hardware and software assets, ensuring proper licensing, and managing device disposal or upgrades.
- Incident and Change Management: The endpoint security analyst may participate in incident and change management processes, ensuring that incidents related to endpoint devices are appropriately tracked, documented, and resolved. They may also play a role in assessing the impact of proposed changes to endpoint configurations.
- Incident Response: In a security breach or system incident, the endpoint analyst plays a role in the organisation’s incident response process. They investigate the incident, identify its root cause, and implement remediation measures to prevent similar occurrences.
- Data Analysis: Analyze data to identify patterns, trends, and anomalies related to endpoint device performance, security incidents, or user behaviour. This analysis can help inform decision-making, optimise processes, and proactively address potential issues.
- Vulnerability Management: Involved in vulnerability management, which includes identifying vulnerabilities in endpoint devices, assessing their potential impact, and coordinating patching or remediation efforts to minimise security risks.
- Compliance: Ensures endpoint devices adhere to compliance regulations and policies. This may involve conducting audits, implementing security controls, and generating reports to demonstrate compliance to internal and external stakeholders.
- Collaboration and Teamwork: Collaborates with other IT teams, such as network administrators, system administrators, and cybersecurity professionals, to ensure seamless integration and coordination of endpoint devices within the overall IT infrastructure.
- Troubleshooting and Issue Resolution: Investigate and resolve technical issues related to endpoint devices. This may involve troubleshooting hardware and software problems, diagnosing network connectivity issues, and providing timely resolutions to minimise downtime.
- Endpoint Deployment and Migrations: Deploying and migrating endpoint devices. This includes setting up new devices, transferring user data and settings, and ensuring a smooth transition from old to new endpoints.
- Continuous Improvement: Actively seek opportunities to improve endpoint management processes, workflows, and technologies. They should stay updated on industry best practices and emerging trends to identify areas of improvement and implement enhancements.
KEY PERFORMANCE INDICATORS
- Mean Time to Detect (MTTD) Vulnerability.
- Mean Time to Respond (MTTR)
- Endpoint Security Incident Rate
- Endpoint Vulnerability Assessment
- Patch Compliance Rate
- Prompt response to Users’ requests.
- Effective resolution of incidents or problems.
- High level of adherence to documentation practices [Policies, Procedures, Logs, Records, etc.]
- Antivirus reports, hardware report e.g. Printer reports, Issues log report
- Issues log report on Manage Engine, Classroom checklist report
COMPETENCIES REQUIRED
- Technical skills – Solid ICT troubleshooting skills; a need to frequently play a direct role in resolving user issues; Knowledge of network/systems design, analysis, productivity tools and operating systems.
- Problem-solving skills – Able to devise technical and creative solutions to user issues
- Communication skills – Telephone etiquettes; Able to gather data about problems, prepare detailed notes and reports, and walk users through the steps they can take to resolve software and hardware issues.
- Time management – Having excellent time management skills and should be able to set priorities when handling multiple cases; Ability to work under pressure and to tight deadlines
- Team collaboration – Able to work with other ICT personnel, Vendors, Contractors and co-works to resolve user issues; Good and flexible communication, interpersonal and influencing skills.
- Ability to manage Users in an enterprise infrastructure environment.
- Continuous approach to the upgrading of ICT skills
PROFESSIONAL QUALIFICATION
- Network [Network+, Security +, Cisco – CCNA Security etc.];
- Microsoft [MCP, MCTS, etc.];
- Cloud [AWS Certifications, CCNA Cloud, , etc.]
- Platforms (HP, Dell, A+, Linux+, etc.]
- Operations [ITIL, Microsoft Office suite, etc.]
EXPERIENCE
- A degree in Computer Science, Computer Engineering, Electrical/Electronic Engineering or related Technology/ Science disciplines.
- Minimum 1- 3 years working experience post-degree working experience in an enterprise or ICT service company.
SALARY GRADE
Administrative
Method of Application
Signup to view application details.
Signup Now