Tuesday, November 16, 2010

IT tasks and roles assignments

Assigning IT roles is not an easy task, as it is an exercise, the individual technical and educational backgrounds, experience and drive merges. In addition, IT staff can be a problem to solve more difficult with the same skills! The following article leads some basic concepts that managers within SMBs where everyone IT is assigned to more than one role.  Start with a list of sites that the IT department within your organization services as such as:

Internal systems and network administration, IT physical and logical security AdministrationExternal systems support (ex: Web Administration) external security (may performance controls include) staging and test maintenance responsibility for environmental protection Administration Office

Ensure that the above list is extensive and includes all support services. Then define from the above mentioned services, responsibilities or roles that are specifically for your environment, for example:

SystemAdministration: Installation/maintenance of operating systems and virtualization platforms, anti-virus programs, e-Mail and Microsoft ADNetwork Administration: technical and administrative control of the LANWeb management: install all web Setup / maintenance and monitoring PerformanceDatabase Administration: PostgreSQL, MySql and MS SQL AdministrationSecurity/control management: monitoring general security including the physical and logical, change management processes, etc.VoIP management review: maintain IP PBX or other specific system backup Administrator: creates backup scripts/jobs and review the logs. Schedule regular meetings with data/system owner to update backup jobs. Manage users assistance in place - and remote backups.End desk: providing full end user Support………

Finally, draw a matrix roles against IT Personal.Die primary responsibility of the staff characterized with a bold X, which means that he/she is efficient and has some authority in this particular area.The IT staff with primary tasks must have one or more backup members.Backup members will take responsibility if the primary member is not available and are marked with an X in the Matrix.Auch are the only member of the primary custodian, which has the power, changes how do per the data owner instructions and the only person owned the administrator passwords (and its superior).

One final point is about the separation, difficult to do in small IT teams kann.versuchen be apart-so to keep much as possible, the General tasks of security and management! monitoring of role assignments, and adjust if necessary, may need compromise between safety and efficiency, but I would leave the decision, senior management!


View the original article here

No comments:

Post a Comment