Hassan Jameel For Cars | Toyota - Lexus

Information Systems Specialist

Information Systems Specialist

1. Follow-up and supervision of technical support for computers and peripherals.
2. Continue to withdraw backups and archive databases.
3. Manage special protection devices to maintain the devices and data.
4. Management and follow-up of Internet networks and modernization.
5. Follow up the main servers and follow up and modify the old systems.
6. Providing the necessary tools, equipment and equipment according to the requirements of the work.
7. Defines the development requirements based on the study of the company’s needs and sets the necessary plans for the required development.
8. Follow up the operation of the applicable systems, assess their efficiency, supervise the analysis of the needs of the departments used for these systems and develop plans to secure these needs.
9. Study and analyze the operating problems of the systems used, develop radical solutions to prevent recurrence, and present them to senior management.
10. Continue to repair the faults as soon as possible and work to minimize them.
11. Supervise the design and testing of the appropriate method to maintain the confidentiality of information according to the areas of activity of users and their levels of functionality and follow-up implementation.
12. Supervise the central database and improve it when necessary.
13. Take the necessary measures that will keep the servers and other devices intact.
14. Print the tasks and powers of the program and signed by signing and handing over to the Director of Internal Audit, and prevents change only with an official letter signed by the Director of the Department and the Director of Internal Audit.
15. In the event that any employee goes for an annual leave, illness or non-employment, all the authority of this employee shall be given to the employee or employees responsible for his own work during the period of his leave, specified by date, for the validity of the work. Employees are prohibited from using the employee’s user who is not on the job, and the user must be closed until the employee has returned.
16. Control the security of access to the network and other operating systems and their uses.
Other Responsibilities:
– Any other tasks entrusted to him by the officials related to his field of work.