Gift of Hopeother related Employment listings - Itasca, IL at Geebo

Gift of Hope

Overview:
Gift of Hope is proud to serve as the federally designated not-for-profit organ procurement organization (OPO) that coordinates organ and tissue donation and provides compassionate service to families of donors in the northern three-quarters of Illinois and northwest Indiana.
Since our inception in 1986, we have coordinated donations that have saved the lives of more than 23,000 organ transplant recipients, and improved the lives of hundreds of thousands of tissue transplant recipients.
As one of 58 organ procurement organizations that make up the nation's organ donation system, we work with 183 hospitals in our donation service area.
The ideal candidate will play a crucial role in designing, implementing, managing, and maintaining the organization's information technology systems.
This includes working with the Architecture Team to evaluate and ensure the efficient and secure operation of IT & business systems.
Responsibilities:
Server Management:
Administer and maintain server infrastructure, including installation, configuration, and monitoring.
Perform regular system updates, backups, and ensure high availability of servers.
Troubleshoot server-related issues and optimize server performance.
Storage Management:
Design, implement, and maintain the storage infrastructure ecosystem.
Design, implement, and maintain data backup environment, including off-site disaster recovery.
Responsible for applying patches, upgrading software, and making sure that data is secure.
Maintain the fiber channel switches, cloud storage and SAN arrangements.
Active Directory:
Design, implementation, and maintenance of Active Directory and Azure Active Directory environments.
Responsibilities include managing domains and troubleshooting Active Directory authentication issues.
Ensure that the Active Directory environment is secure, efficient, and scalable.
Manage certificate authority servers, certificate lifecycle, and secure PKI infrastructure.
Provide management and support of DNS systems.
Develop strategies for disaster recovery and ensuring compliance with regulations and policies.
System Design, Implementation & Configuration:
Design, implement, and maintain IT systems and infrastructure.
Ensure the seamless integration of innovative technologies into existing systems.
Assist in the recommendation of hardware and software solutions to meet organizational requirements.
Security and Compliance:
Develop, implement, and enforce security policies, procedures, and best practices.
Assist during regular security audits and vulnerability assessments.
Ensure compliance with industry regulations and standards.
Monitor and address issues related to device endpoint security and configuration deployment.
Technical Support:
Collaborate with the service desk team to resolve escalated technical problems.
Develop and maintain documentation for troubleshooting and system configurations.
Provide technical support to end-users, addressing hardware and software issues.
Perform incident root cause analysis and remediation of system outages.
Participate in on-call rotation to provide off-hours support and maintenance.
Collaboration and Communication:
Work closely with cross-functional teams to understand business requirements.
Collaborate with peers, system architects, and other stakeholders to develop effective IT solutions.
Communicate technical information to non-technical stakeholders.
Maintain infrastructure diagrams, configurations, and operating procedures.
Continuous Improvement:
Stay informed about industry trends and emerging technologies.
Propose and implement improvements to enhance system performance and efficiency.
Participate in ongoing professional development to stay current with relevant certifications and skills.
Qualifications:
Experience & Education:
Bachelor's degree in information technology, computer science, related field, or equivalent experience.
5-10 years of experience in IT infrastructure.
Proven experience as a Systems Engineer or similar role.
Relevant certifications e.
g.
, Microsoft Certified Systems Engineer (MCSE 2016 +), Information Technology Infrastructure Library (ITIL V2-3).
Strong knowledge of Microsoft identity and access management products.
Strong skills in Microsoft Windows 2019
Administration and support will be required.
Strong knowledge of hardware, operating systems, and software applications.
A working knowledge of SQL server would be a plus.
5 years of experience administering a complex Active Directory, Hybrid AD, or Azure AD environment of at least 500 to 1000 users.
Experience working in a data center environment.
Experience with cloud service models including IaaS, PaaS, SaaS.
Experience with scripting languages such as PowerShell, Automation and Python.
Proficiency in network administration.
Ability to work independently and collaboratively in a team environment.
Excellent problem-solving and communication skills.
Demonstrate excellent written and verbal communication skills.
Demonstrate presentation, organizational and planning skills.
Demonstrate effective interpersonal and human relations skills.
Exhibit sensitivity to and awareness of the specific needs of customers and business partners.
Strong hands-on experience delivering and supporting solutions using the following technologies:
Microsoft Server 2016+, Hyper-V 2016+, Microsoft Active Directory 2016+, Microsoft System Center Machine Manage 2019+, Dell Compute & Storage (M7000 Blades and Compellent (iSCSIFiber Channel)), Synology NAS, Nakivo-Wasabi, Okta, Azure Active Directory, Microsoft Office 365, Microsoft Office technologies, Microsoft Intune, DUO, Sentinel One About the Company:
Gift of Hope.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.