[Vacancy]: ICT Officer Needed at Tranquil & Quest Medical and Diagnostics Limited

May 6, 2024
Application deadline closed.

Job Description

The ICT Officer must have healthcare industry experience.

Job Details

  • Determining major areas/issues on the corporate systems that require attention due to re-occurring or continuous problems. Prioritizing the issues, attending to them, and/or delegating as the situation permits.
  • Identifying all points within the Operating Systems (OS) processes that may negatively impact on security, software compliance, or data integrity within all the systems.
  • Compiling standardized procedures for dealing with the identified problem areas: e.g. security procedure for data backups, spare hardware required to ensure systems operations continuity, etc.
  • Laying down and implementing operational security standards to ensure a high level of control over access, usage, and manipulation of systems. This also relates to backup procedures and steps that are enforced to ensure and monitor security.
  • Performing operating systems and software updates in line with plans, or as the need arises, due to systems/user requirements or supplier recommendations (mostly part of contractual obligations).
  • Identifying aspects that will bear a direct impact on users in terms of operating changes and arranging training through suppliers or helpdesk/skills administrator. Coaching of affected staff on the job, in case of minor impact.
  • Performing post-implementation checks to ensure that the update/upgrade has been successfully implemented, and monitors systems based on key criteria to ensure that their operational functionalities are as intended.
  • Identifying key points and measures that will provide reliable assessments of the performance and integrity of the software on all systems within TQMD.
  • Ensuring that hardware capacity is maintained and arranging for an increase in capacity as required. Knowledge on basic hardware troubleshooting.
  • Developing security mechanisms (backups, incident reports, etc.), procedures (intermittent checks, password control, etc.), and policies that will ensure that security is managed at operational and strategic levels. Performing intermittent checks on key security points (access points, database security profiles, etc.)
  • Compiling standard reports on performance and incidence of events (downtime, data losses, etc.) in line with managerial/user requirements, and ensuring that the information presented is clear, accurate, and in line with user’s needs; keeping in mind that information is used for decision making (e.g. average uptime, incidents of systems failure, etc.)

The post requires skills in:

  • Analytical Thinking: Interpreting, linking and analyzing information to understand issues.
  • Business Analysis: Knowledge and ability to apply the principles of business analysis in the planning, reengineering, and requirement gathering for government business environments, operations, processes, and practices.
  • Client Focus: Identifying and responding to current and future client needs; providing service excellence to internal and external clients.
  • Communication – the ability to clearly convey information and ideas to individuals or groups in a manner that helps them understand and retain the message.
  • Dedication and willingness to put in extra effort and time when required
  • Emotional Maturity, Innovative Problem Solving and Integrity
  • Managing Conflict – the ability to deal effectively with others in an antagonistic situation; using appropriate interpersonal styles and methods to reduce tension or conflict between two or more people.
  • Managing Work – ability to manage one’s time and resources to ensure that work is completed efficiently.
  • Safety Awareness – the ability to be aware of conditions that affect employee safety.
  • Security / Information & Application Protection: Knowledge and ability to ensure there are adequate technical and organizational safeguards to protect the continuity of IT infrastructure services by the implementation of IT security principles, methods, practices, policies, and tools that are used in securing IT resources including information and operations security, physical security, business continuity/disaster recovery planning, methods to deal with security breaches and security assessment in a technical environment.

Click here to apply