
Network Support & Administration - Assist in configuring and supporting network devices (routers, switches, access points) using MikroTik, Cisco, Ubiquiti, and Huawei platforms. Support LAN and WAN deployments including IP addressing, VLANs, NAT, DHCP, DNS, and basic routing. Troubleshoot network performance issues such as latency, packet loss, Wi-Fi instability, and VPN connectivity. Monitor network availability and performance using tools such as Winbox, The Dude, Wireshark, or SolarWinds. Assist in maintaining inter-branch connectivity, VPN access, and remote user network support.
Cybersecurity Monitoring & Protection - Monitor system logs and alerts for unauthorized access attempts, VPN failures, phishing indicators, or malware activity. Assist in enforcing access controls, strong password policies, MFA, and secure VPN configurations. Support basic firewall rule configuration, DNS filtering, and endpoint protection measures. Log and escalate security incidents following defined incident-response procedures. Assist with recovery actions such as password resets, device isolation, and secure reconfiguration.
IT Support & User Assistance - Provide first-level technical support for staff on network access, email issues, VPN setup, and connectivity challenges. Support onboarding and offboarding processes including user account creation, permission assignment, email setup, and Wi-Fi access. Assist during online meetings, trainings, and recordings (Zoom, Microsoft Teams, YouTube Premieres).
Training & Knowledge Sharing - Support internal training for interns, trainees, and junior staff on: Basic networking (IP addressing, cabling, routing, Wi-Fi setup) Cybersecurity awareness (phishing prevention, password hygiene, safe browsing) IT operations (VPN usage, email security, file sharing, printer setup) Assist in preparing user guides, SOPs, onboarding manuals, and technical documentation. Provide technical support during company training programs, workshops, and outreach sessions.
Documentation & Reporting - Maintain accurate records of incidents, device configurations, IP allocations, and equipment inventory. Update basic security logs and assist with backup verification and validation records. Document network and security changes including firewall rules, access permissions, and configuration updates.