Senior Information Systems Manager At Baylor College of Medicine Children’s Foundation – Lesotho

669

ADVERTISEMENT

Overview:
Baylor College of Medicine Children’s Foundation – Lesotho. The Baylor College of Medicine Children’s Foundation – Lesotho (BCMCFL), is the result of a publicprivate partnership between Baylor College of Medicine International Pediatric AIDS Initiative and the Government of Lesotho, and is a legal, non-profit/tax exempt organization registered in Lesotho. BCMCFL provides free paediatric and family-centred HIV and tuberculosis prevention, care, treatment, and support, serving thousands of children and families affected by HIV, TB, or other child health conditions.

BCMCFL is looking for highly qualified candidates to fill the following position on a full-time, Fixed-Term Contract basis. The position is based at Maseru Center of Excellence (COE)

Position: Senior Information Systems Manager x 1

Duties and Responsibilities
Position Description

The Senior Information Systems Manager is responsible for overseeing and managing the Foundation’s IT operations, systems, infrastructure, and services. H/She will play a crucial role in aligning technology strategies with the Foundation’s goals, ensuring efficient and secure operation of IT resources, to support the overall objectives of the Foundation. H/She will be responsible for overseeing a team which handles day-to-day IT operations, including system maintenance, upgrades, and troubleshooting, as well as coordination of IT support services, incident response and problem resolution, and monitoring system performance to minimize downtime and disruptions. The Senior Information Systems Manager reports directly to HR and Admin Director.

Duties and Responsibilities
Responsibilities include, but are not limited to:


IT Governance and Strategic Planning

  • Contribute to the development and implementation of IT strategies that align with the Foundation’s goals and objectives.
  • Assess technology needs, identify opportunities for improvement, and plan for the implementation and maintenance of IT systems and infrastructure.
  • Establish clear and comprehensive IT policies, procedures and guidelines for ensuring proper use, security and management of information technology resources within the Foundation.
  • Identify, assess, and manage IT -related risks to protect the Foundation’s assets, reputation, and operations.
  • Ensure that IT practices and processes comply with relevant laws, regulations and industry standards.
  • Implement robust security measures to safeguard sensitive data, prevent unauthorized access, and protect against cyber threats.
  • Establish policies and practices for managing data throughout its lifecycle, addressing issues such as quality, integrity, and accessibility.
  • Provide ongoing training and awareness programs to ensure that employees understand and adhere to IT governance policies and procedures.
  • Implement effective change management processes to minimize disruptions when introducing new technologies or making significant IT-related changes.

Team Leadership

  • Lead and manage a team of IT professionals.
  • Provide guidance, support and supervision to team members, assign tasks, and ensure the team’s skills and expertise align with the Foundation’s needs.
  • Foster a collaborative work environment, encourage professional development, and conduct performance evaluations.

Budgeting and Resource Management

  • Manage the IT operational budget, allocating resources effectively and making informed decisions about technology investments.
  • Assess cost-effectiveness and optimize the use of resources to maximize value for the Foundation.
  • Work closely with internal stakeholders, including department heads and senior management, to understand business needs, prioritize IT initiatives, and ensure alignment between technology and the Foundation objectives.
  • Advise on capital replacement projections and budgets.
  • Assist in the development of project plans, timelines, and resource allocation to ensure successful projects execution.
  • Stay up to date with industry trends and emerging technologies, providing insights and recommendations for continuous improvement.

Monitor and Maintain Foundation Network Infrastructure

  • Conduct through and regular network infrastructure assessments and share reports with Senior Management.
  • Conduct regular security audits and assessments to identify vulnerabilities and address potential weaknesses in the IT infrastructure.
  • Develop and maintain a network design for the Foundation network structure that is secure, easy to expand and manage.
  • Deploy robust network monitoring tools to track performance metrics, identify issues, and proactively address potential problems.
  • Implement firewalls at network perimeters to control incoming and outgoing traffic and protect against unauthorized access.
  • Enforce strict access controls, including the principle of least privilege, to limit user access to only the resources necessary for their roles.
  • Deploy and regularly update antivirus and anti-malware software to protect against malicious software threats.
  • Secure physical access to networking equipment to prevent unauthorized tampering or theft.
  • Implement Quality of Service (QoS) setting to prioritize critical applications and services, ensuring optimal performance for essential business functions.
  • Analyze monthly internet usage reports and advice senior management on necessary actions.

User Management and Emails

  • Establish efficient processes for creating and disabling user accounts promptly as employees join or leave the Foundation, ensuring access is granted only to authorized personnel.
  • Implement Role-Based Access Control (RBAC) to assign specific permissions and access level based on job roles, minimizing the risk of unauthorized access.
  • Define policies for granting temporary access to external collaborators or guests and monitor their activities to ensure security.

Management of IT Inventory

  • Develop and maintain a centralized database or system to track the status of all IT assets, including hardware, software, licenses, and peripherals.
  • Conduct regular audits of IT assets to verify their physical presence, functionality, and accuracy of recorded information to identify discrepancies and ensure that the inventory is up to date.
  • Maintain appropriate asset tagging with unique identifiers for each piece of hardware to make it easier to track and locate items during audits and help prevent loss or theft.
  • Categorize IT assets based on type, department, location, or other relevant criteria for better organization and facilities reporting and analysis.
  • Implement a lifecycle management strategy that includes planning, procurement, deployment, maintenance, and retirement of IT assets to ensure that resources are utilized efficiently, and that outdated equipment is replaced.
  • Maintain detailed documentation for each IT asset, including specifications, purchase date, warranty information, and relevant support contact for troubleshooting and planning.
  • Keep track of software licenses to ensure compliance with legal requirements, including monitoring the number of licenses, renewal dates and usage.
  • Implement security measures for IT assets, such as password protection for devices and encryption for sensitive data.
  • Clearly define security policies and ensure that they are enforced.
  • Establish users’ accountability by assigning IT assets to specific individuals, keeping records of personnel responsible for each asset, making it easier to trace issues or track down missing items.
  • Regularly backup critical data stored on IT assets to appropriate cloud-based platforms to ensure that important information is not lost in case of hardware failures or other issues.
  • Develop a process for decommissioning and disposing of obsolete or non-functioning IT assets; ensure that data is securely wiped from storage devices before disposal.

Security and Risk Management

  • Ensure the security and integrity of IT systems and data.
  • Develop and implement security policies, procedures, and protocols.
  • Monitor for potential threats, conduct risk assessments, and ensure compliance with relevant security standards and regulations.
  • Manage security incidents and collaborate with cyber security professionals to mitigate risks.

Perform any other tasks as assigned by the Management.

Educational Qualifications, Work Experience and Key Competencies

  • A university degree in Computer Science, Computer Information Systems, Information Technology, Computer Software Development, or related qualification preferred; Postgraduate degree will be an added advantage.
  • Possession of any Microsoft certification and knowledge of Microsoft 365 is a must.
  • Professional certifications such as Certified Information Systems Security Professional (CISSP), or Certified Information Systems Manager (CISM) and Cybersecurity certification would be an added advantage.
  • Previous experience as an IT Manager for a minimum of five (5) years.
  • Experience working in a health care organisation.
  • Working experience with Microsoft Exchange Email Service is a must.
  • Experience with management of a medium to large scale Windows based client-server network.
  • Experience with administration of Windows Server 2012 (or greater), including experience setting up Domain Controllers, Active Directory, DHCP, etc.
  • Experience with enterprise -grade back-up solutions.
  • Experience setting up and managing network firewall systems and endpoint security solutions.
  • Ability to diagnose and repair basic hardware issues.
  • Ability to write and maintain documentation on the layout/design of the I.T infrastructure.
  • Experience writing hardware and software applications specifications for purchasing proposals for additional hardware/software.
  • Ability to easily communicate technical information to non-technical management teams.
  • Experience with database administration is an added advantage.
  • Proficiency supporting different operating systems (iOS, Windows, Linux, etc).
  • Ability to load and troubleshoot various software and hardware systems.
  • Good knowledge of various networking concepts
  • Demonstrated high proficiency in English and Sesotho (reading, writing, and speaking).
  • Must be a self-starter and team player.
  • Able to work with minimum supervision, prioritize own workload, anticipate the technical needs of the staff, and meet deadlines.
  • Should be conscious in determining needs and making purchase recommendations.
  • High level of integrity, accountability, trustworthiness, and ethically sound behaviour.
  • Must be willing to travel to outlying districts to provide I.T. support.
  • Excellence organisational, time management and prioritizations skills and attentions to detail are required.
  • Must be able to deal with maintenance issues

The above statements are intended to describe the general nature and level of work being performed. They are not to be construed as an exhaustive list of all responsibilities, duties and skills of the Senior Information Systems Manager.

How to apply:
Interested Basotho candidates who meet the criteria must email applications letters including CVs, certified copies of identity document, qualifications and three workrelated referees with contact details (one should be from current supervisor/employer).

All applications must be emailed to [email protected] on or before 12:00 noon Friday, 8th March 2024. Clearly indicate the name of the post applied for on the subject Line. Applications to be done through email provided only. No hard copies will be accepted. Late applications will not be considered. Failure to comply with the above directions will results in the application being disqualified.

BCMCFL reserves the right to leave an advertised position unfilled if no suitable candidate is identified. Only shortlisted candidates will be contacted.

Comments