Search by job, company or skills

Trivers Associates, Inc.

Senior System Engineer

new job description bg glownew job description bg glownew job description bg svg
  • Posted 5 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

The Job Summary

The Senior System Engineer is responsible for designing, implementing, and maintaining the IT infrastructure; supporting various systems,

networks, servers, and storage devices to ensure optimal performance, availability, and security.

Key Strengths:

  • Infrastructure architecture (on‑prem, hybrid, cloud)
  • Advanced systems engineering: Windows, Linux, AD, DNS, VMware
  • Azure/AWS experience, including identity, governance, and cost control
  • Strong networking and security foundation
  • DR/BCP planning, storage, and backup management
  • Monitoring, performance tuning, and complex troubleshooting

Leadership & Strategy:

  • Leading and mentoring technical teams
  • Managing infrastructure projects and vendors
  • Roadmapping, lifecycle management, and modernization initiatives
  • Budgeting and procurement

Key Responsibilities:

1 -Enterprise Virtualization Solution Design

 Ensuring stability, integrity, and efficient operation of the inhouse information systems that support core.

  • organizational functions, analyze, plan, implement, maintain, troubleshoot and administer Group's

technical infrastructure and systems consisting of data centre, virtualization, server infrastructure and

information security etc.

  • Administer Group's systems, networks, infrastructure and security domains, gauging the effectiveness and

efficiency of existing systems and implementing IT strategies for improving or further leveraging these

systems.

  • Administer servers and security audits, system backup procedures, and other recovery processes in

accordance with the Group's disaster recovery and business continuity strategies.

 Analyse network data and infrastructure to determine inefficiencies/problems and proposes effective

solutions for smooth system functionality.

 Working closely with the Infrastructure Manager, spearhead the systems development, installation,

configuration, integration and troubleshooting.

 Keep a hawk's eye on systems and networks for viruses, malfunctions and errors with proactive approach in

order to avoid any risk, discontinuity or interruption in Group's smooth functionality.

 Stay abreast of all technology related advancements, protocols, and best practices sharing these with the

senior IT management.

 Collaborate with all internal stakeholders to understand virtualization requirements and assess the existing

IT infrastructure, applications, and workloads to identify areas where virtualization can bring benefits.

 Analyse performance, scalability, and security requirements to ensure that the virtualization solution meets

the organization's needs.

 Develop a virtualization design that aligns with the Group's objectives, taking into consideration factors

such as performance, availability, manageability, and cost-effectiveness.

 Select appropriate virtualization technologies and platforms based on the Group's requirements and

existing infrastructure.

 Design the virtualization infrastructure, including server consolidation, storage virtualization, network

virtualization, and desktop virtualization.

 Determine the optimal configuration for virtual machines, including CPU, memory, storage, and networking

resources.

 Administer servers and security audits, system backup procedures, and other recovery processes in

accordance with the Group's disaster recovery and business continuity strategies.

2-Data Center & Infrastructure Administration

 Lead in planning, implementation, and maintenance of the organization& IT infrastructure, including

network systems, servers, storage, and data centres.

 Collaborate with IT teams to ensure infrastructure components are properly configured, monitored, and

maintained.

 Supervise the team of IT staff for administering Group's systems, networks, infrastructure and security

domains, gauging the effectiveness and efficiency of existing systems and implementing IT strategies for

improving or further leveraging these systems.

 Allocate IT infrastructure resources, such as servers, storage, and network bandwidth, based on business

needs and priorities.

 Develop custom adapters or connectors to bridge the gap between systems with different protocols or data

formats.

 Define data mapping and transformation rules to ensure seamless data flow between different systems.

 Implement proactive monitoring and alerting mechanisms to identify and address potential issues before

they impact the infrastructure.

 Troubleshoot and resolve infrastructure-related issues promptly to minimize downtime and disruptions.

3- System Integration & Configuration

 Monitor the performance and availability of the Group's servers, networks, and other infrastructure

components using monitoring tools and techniques.

 Perform routine maintenance tasks such as patch management, firmware upgrades, and system updates to

ensure optimal performance and security.

 Implement Extract, Transform, and Load (ETL) processes or data integration tools to consolidate and

synchronize data across systems.

 Establish data governance practices to maintain data quality, consistency, and integrity during integration.

 Assess the existing IT landscape, including systems, applications, databases, and networks, to identify

integration requirements.

 Define integration goals and objectives based on business needs and processes.

 Develop a comprehensive integration strategy and roadmap, outlining the approach, timelines, and

resources required for successful integration.

 Integrate applications by enabling them to share data and functionality through APIs, web services, or

messaging protocols.

 Implement middleware or integration platforms to facilitate communication and orchestration between

applications.

 Keep a hawk's eye on the Group's systems and networks for viruses, malfunctions and errors with proactive

approach in order to avoid any risk, discontinuity or interruption in Group's smooth functionality.

4-Information Security

 Implement information security awareness programs to promote a culture of information security within

the Group.

 Implement access control mechanisms to ensure that only authorized individuals have access to sensitive

information and systems.

 Administer user accounts, including provisioning, deprovisioning, and regular access reviews.

 Implement strong authentication mechanisms, such as two-factor authentication, to enhance access

security.

 Implement security monitoring tools and techniques to detect and respond to security events in real-time.

 Perform regular vulnerability assessments and penetration testing to identify and address security

weaknesses.

 Monitor system logs, network traffic, and security alerts to identify potential security breaches.

 Implement security information and event management (SIEM) systems to centralize and correlate security

events.

 Establish an incident response plan to effectively detect, respond to, and recover from security incidents.

5-Applications Performance Analysis

 Establish performance monitoring mechanisms to collect relevant metrics, such as response times,

throughput, CPU and memory usage, network latency, and database query times.

 Implement monitoring tools or application performance management (APM) solutions to capture and

analyse performance data.

 Set baseline performance metrics to establish a performance benchmark for comparison and evaluation.

 Conduct performance testing to simulate real-world usage scenarios and evaluate application performance

under different loads and stress conditions.

 Use load testing tools to measure application response times, throughput, and scalability.

 Identify performance bottlenecks, such as slow database queries, inefficient code, or network latency,

during performance testing.

 Monitor system-level resources, such as CPU, memory, disk I/O, and network utilization, to identify

resource bottlenecks affecting application performance.

 Optimize resource allocation and ensure sufficient capacity to handle application workloads.

Required :

1: Educational Qualifications Bachelor's Degree in Computer Science

2: Professional Certifications MCSE / VCP-DCV / NCP-MCI ; CompTIAA+ / Network+ Certifications are preferred

3 Experience: Minimum 10 years of experience in system design; infrastructure operation; network

integration & administration; information security; disaster recovery; virtualization and

cloud computing

4 Technical / Software Expertise MS Office Suite; ERP

5 Languages Proficiency Fluent in Arabic English languages

More Info

Job Type:
Industry:
Employment Type:

Job ID: 145328607

Similar Jobs