Friday, July 31, 2020

PKF O'CONNOR DAVIES SELECTS IVDESK FOR IT SERVICES

Today, PKF O'Connor Davies, a New York-based bookkeeping and warning firm, chose IVDesk to convey total IT administrations to the firm. Through the association, IVDesk will give complete IT administrations to help PKF O'Connor Davies' progressing development or to give more significant level availability as the company's customer base extends, broadly and universally helpdesk support jobs.

"We are satisfied to be picked by PKF O'Connor Davies as their IT administrations supplier," says Chuck Reese, CEO of IVDesk. "PKF O'Connor Davies is a Top 30 Accounting firm in the U.S. (source: Accounting Today) and we accept this determination is a demonstration of the versatility of our design and stage for all CPA firms the nation over."

PKF O'Connor Davies has an attention on esteem, which has driven their development and pushed them into the main 26 firms on Accounting Today's 2016 Top 100 Firms List. As the lead North American firm in the PKF International system of autonomous bookkeeping and warning firms, PKF O'Connor Davies will utilize their relationship with IVDesk to give the overall network and assets their customer's longing.

"Our customers request overall network and we have the assets for them any place and at whatever point they need them," says Don Logan, Chief Information Officer at PKF O'Connor Davies. "That is the reason we're not the average bookkeeping firm. Our customers know more noteworthy assistance. They know more prominent associations."

About PKF O'Connor Davies

PKF O'Connor Davies is another type of bookkeeping and warning firms that holds itself to a better quality – going past detached worth figuring to dynamic worth creation. With workplaces in 440 urban communities in 150 nations around the world, they are the lead North American firm in the PKF International system of autonomous bookkeeping and warning firms. With unparalleled customer center they open genuine worth covered up at key association focuses in each commitment – from the business and asset levels, to the association and administrative levels in provincial, national and global fields.

About IVDesk

IVDesk releases the potential in each organization. Their IT administration enables firms to team up, drive new business and serve their clients better. IVDesk has been joining forces with CPA firms for a long time and various firms the nation over utilize IVDesk's IT administration. The capacity to have a safe, consistently on administration incredibly helps in an association's development, cooperation, correspondence, administration the executives and ability improvement to work more intelligent and convey quality outcomes on schedule and outpace the opposition. IVDesk gives a total IT arrangement by facilitating the entirety of a client's work area, information and applications while including day in and day out assist work area with supporting and reinforcement/recuperation arrangements. IVDesk is a pioneer in conveying facilitated IT, and keeps on coming out on top as an ever increasing number of associations move to a compensation for-use, distributed computing model for their IT administrations.

Thursday, July 30, 2020

Distant worker upkeep

Today, a large portion of the procedures in the organization's work are completed utilizing PC gear. This is the way in to the viability and dependability of a huge undertaking or little office. As needs be, for such work it is difficult to manage without workers that give brought together handling, information stockpiling and other significant procedures.

Understand that you get the most significant level of unwavering quality of the workers and all PC hardware in the event that there is a distant support and organization of the workers. Already, worker upkeep occurred straightforwardly on the organization's premises. Presently, flight and IT administration on the customer's domain are not required, since by giving access to your gear through an uncommon program, you give ideal conditions to unraveling any issue network administrator certifications.

Far off IT administration is a proactive issue arrangement that permits you to rapidly design hardware, introduce, arrange programming, make a reinforcement database, introduce get to apparatuses and guarantee security for every client of the organization.

Far off Maintenance: Local region organize organization

Frequently, distant worker upkeep is a help that is required by an organization with a limited quantity of PC gear, with or without a worker. Additionally, far off IT administrations, distant worker organization, and a far off manager are required by the organization's topographically far off offices. In some cases such administrations are organizations in a condition of starkness.

Far off Maintenance Features

Far off organization, worker support is performed distantly, that is, the master doesn't go to the workplace to the client. How precisely do we serve PCs? Exceptional methods are utilized for distant access, just as terminal access. Regardless of what the size of your organization, an IT review is required. Data is gathered on the number, area of PCs, on the Internet get to channels, on organize hardware, and on access to the switch. On account of the receipt of such data, it is progressively advantageous and simpler for you to work with us, since pros will have a deep understanding of the circumstance in your organization.

Points of interest and burdens

The most significant favorable position, which has the administration of PCs and workers in Moscow, is productivity. Coordinated effort idea: quick, proficient and benevolent. What's more, this implies by associating with your PC, an authority will have the option to take care of a colossal number of issues and now and again fix the gear. In the event that the errand can't be fathomed through far off support, at that point the request for IT administrations is conceivable as flight of experts to the article. A weakness can be known as the way that in troublesome circumstances, the master visits the office, while the hourly installment for the administration happens.

Who does the support of your PCs and workers? Far off upkeep of PCs and workers is performed by an entire group of specialists, comprising of IT experts with huge involvement with building and building up a system.

What is the motivation behind adjusting PCs and workers? This is a steady activity of the framework, a fast answer for issues, control of information reinforcement, examination of log information, evolving passwords, dealing with a rundown of workers, and so forth.

Wednesday, July 29, 2020

Configuring and maintaining Microsoft servers

Server maintenance is the maintenance of the server hardware and software in working order. We offer configuration and maintenance of servers of the Microsoft Windows family.

What is included in the subscription service of servers?
Server hardware and software diagnostics
Configuring various services and server services;
Installing the required software on the server;
Remote administration;
Configuring security in data transmission and storage;
Timely server maintenance.
Server maintenance microsoft.
Server service directions
Setting up and maintaining corporate mail based on Exchange 2007/2010 ;
Setting up and maintaining a SharePoint server;
Organization and support of a failover cluster based on Hyper-V ;
Domain structure: creation, upgrade, migration, setting up policies and restrictions, support, restoration;
Proxy servers: organization, upgrade, setting rules and restrictions, support, restoration;
Organization and support of the Print Server, support, restoration;
Organization and support of fax service, support, recovery;
Organization and support of file storage, support, recovery;
Organization, setting up backup, restoring from backups.
How much is?
The cost of server maintenance depends on a number of factors, in particular, the cost of server subscription service depends on: Difference between network engineer and network administrator

Number of servers;
Business requirements for the speed of response to requests
Business requirements for the continuity of IT services;
Specifics of the software used.
Quality assurance
When setting up servers, we give a 3 month warranty for our work

Tuesday, July 28, 2020

IT service. Tariff "Anti-crisis" without a monthly fee

Who  is it for?
If you have a small park of computer equipment or everything works as it is, but sometimes something happens. Then this offer is just for you!

The size of companies is from 1 workplace to 30 computers.

When you need it:
Cost cutting urgent?
Is it expensive to keep your sysadmin?
Your administrator doesn’t know what he’s doing, and your computers seem to be working fine anyway?
Costs need to be cut, but there is no certainty that everything will work the same.
IT Companies usually offer you services, usually in one of two ways:

The same specialists deal with you. They monitor the health of your network, computers and servers, and are responsible for their availability. They are responsible to you for the timing of solving problems. Subscription fee. What if you never refer to them for the whole month? What then to pay for?
"One-time trips" You only pay for departures. There are no additional fees. Not the fact that you will be dealt with by the same specialists. In addition, with such a scheme, it is impossible to obtain guarantees on the timing of solving problems.
The value of this offer:
You don't have a sysadmin on staff. You don't pay any subscription fee. Pay only for specific work on specific issues. Not more.

At the same time, you can be sure that competent specialists work with you, promptly and professionally, in the shortest possible time, solving your questions

The essence of the proposal: Network administrator responsibility
You do not pay a subscription fee, but the contract concluded with us guarantees you compliance with the standard terms of service and the specific specialists assigned to you. Which in turn will give you a high level of service at the lowest cost.

How much does pay-as-you-go IT service cost?
We distinguish 4 types of work:

Our statistics show that 90% of requests are resolved remotely.

All prices excluding VAT

Service acceptance scheme
Our specialist comes to your place and conducts an express audit of your infrastructure. After analyzing your situation, we conclude a contract with you, by which we guarantee the level of service you need.

What is the settlement scheme?
We conclude a contract for IT services with a fixed cost of work.
You make a deposit of 5,000 rubles. This deposit is a guarantee of our prompt response to your requests.
For each call from your deposit funds are debited.
At the end of the month, we provide a report on your calls and the time spent by us.
IMPORTANT:

If the deposit is not fully spent, then we issue closing documents only for the spent amount.
If the number of hours exceeds the amount of the deposit, then an invoice is issued for an additional payment and closing documents for the full amount.
If the deposit is spent, then you must re-deposit the amount of 5,000 rubles.

Scheme of work

Departure of a technical specialist to your office
An engineer conducts a free audit of the current IT infrastructure
Sends you an agreement and account for making a deposit

Signing a contract and making a deposit
You sign the contract and pay the bill.
We add your company to our application system.

Working with IT requests from your employees
User and hardware support
Coordination of each exit

Monthly report on work and time
Preparation and submission of the report
Provision of closing documents.
Additional benefits
We have a replacement stock of components, which allows us to solve hardware issues in a short time.
If you need to purchase equipment or software, we will select it for you absolutely free of charge. And the prices of our partners are often lower than the market and are pleasantly pleasing.
We will adjust the financial conditions for this service if the number of requests from your company is large. Correct in the direction of reducing the cost for 1 call / 1 exit.
Free consultations on IT infrastructure modernization.

Friday, July 24, 2020

Enterprise IT infrastructure management: ingredients for success

ITIL mentions a lot of documentation that is used to successfully manage IT infrastructure, such as implementing ITSM. It should be noted that the IT infrastructure of the enterprise, effective management (ITSM), monitoring and audit are the main points to which the outsourcing company pays attention. When business globalization takes place, each element of the company is influenced from the outside, while the whole complex of projects and systems becomes more complex. And to optimize IT processes, it is necessary to use IT solutions, but many of them require special knowledge and skills from specialists. It is ITSM that makes it possible to introduce a process approach in a company and optimize work in the IT service and in all business processes.

An important element in the IT infrastructure is information flow schemes. They reflect the routes for the movement of information, its total volume, at the place of its origin, as well as for its use as a result. The information flow diagram necessarily goes through a procedure such as structure evaluation. This is necessary in order to develop measures to improve the entire management system.

IT infrastructure documentation network administrator requirements

For your IT infrastructure to function and your IT strategy to be implemented, you need to have a wide variety of information about your IT strategy. This information can be used by the CIO, his subordinates, representatives of the management department and other categories of users.

Such documentation should include IT strategy, corporate thesaurus, organization standards in the field of IT, description of the organization of IT departments, regulations, SLA. It is also a diagram of information flows intended for external executors and IT professionals, and a diagram of the relationship between services and systems. A separate type of documentation is documentation for IT components. This is a description of the structure, organization processes, documentation for basic services, systems, applied systems and non-system tools.

IT infrastructure of modern companies: general trends

In modern companies, where the infrastructure of the IT department is clearly formed and debugged, where the analysis of the IT infrastructure of the enterprise is carried out and the development of the IT infrastructure takes place in accordance with the plans, a competitive advantage appears at the strategic level. At the same time, all business processes that expand over time require the complexity and expansion of the entire software and hardware complex. There have been many studies that have looked at IT management processes, and in the course of such work, standards and rules have been created for good IT management for businesses of various sizes. So, the IT infrastructure of one state budgetary educational organization can be considered. The main problem here was a lack of understanding of what the business needs. First, information of the IT infrastructure was collected with a description of the model, then it was necessary to interest the employees of the IT department, to analyze the collected information. Critical areas are then monitored, performance metrics are introduced, IT priorities are set, and management is reported.

Thursday, July 23, 2020

Computer help call master

Calling a computer foreman at home in Moscow: quickly, professionally, inexpensively

When there is no time, and computer assistance is urgently needed, services that include such work as repairs, diagnostics, setting up computers and laptops, installing software, OS and various additional applications are provided by our service.

Urgent computer assistance at home or in the office will be provided to you with a 30% discount on all services! We are ready to carry out repairs of computers and laptops even in those situations when other companies refused to carry out the work due to lack of necessary equipment, too many orders or the complexity of the problem network administrator job description.

Why is it worth contacting our computer repair shop in Moscow? First of all, because we can call a computer technician at home. Secondly, we have a clear price list for computer assistance services in Moscow, so you do not have to overpay for unnecessary services. A short list of computer assistance services will allow you to choose the types of assistance that you really need. So, it can be diagnostics, configuration, virus removal or installation of specialized programs.

An ambulance computer help in Moscow is a quick departure of the master at any time convenient for you. Calling a computer technician to your home or your office means reasonable and reasonable prices for the services provided. Departure of the computer foreman to the home or office is available for everyone. At the same time, the services of a computer foreman in Moscow take into account the type of breakdown, the need to replace components, and the complexity of the repair. A short list of computer assistance services at home with a list of typical breakdowns is already indicated on our website, so you can always determine how much you need to count on.

We repair computers, laptops in Moscow at affordable prices!

The work performed by our computer repairmen in Moscow is a professional service. We adhere to a strict algorithm for performing operations, therefore, setting, installation, computer diagnostics are carried out with the highest quality and guaranteed reliable.

Home computer repair service requires a strict sequence of services. First, you contact us, and then a master comes, whose primary task is diagnostics, and then - computer repair. After troubleshooting, the computer wizard gives home recommendations that will help avoid serious problems in the future.

Urgent computer assistance will also interest businesses and offices. We offer all types of services that you may need for your work. At the same time, the services of HelpIT.me (Moscow) will allow you not to interrupt your employees from the work process, since our masters can perform prompt computer repairs, as well as provide the user with all the necessary programs, settings and other products for professional activities.

Computer or laptop crashed? Not sure where to go? We will help you!

Computer assistance with a home visit makes it possible to quickly eliminate any problem. It can be a virus, a malfunction of the equipment, setting up programs necessary for the operation. Computer assistance is a type of service that will allow you to restore the performance of not only computers and laptops. Home computer repair and home computer assistance is about cleaning external drives from malware, debugging and tuning software, upgrading computers and laptops. We also carry out work related to malfunctions of peripheral equipment.

Can you solve some PC problems yourself? Naturally, you can. Even an ordinary PC user will be able to eliminate a number of problems associated with restoring the operation of the device, finding deleted files, and creating backups. But if you need urgent repair of computers and laptops in Moscow, and you are not an advanced user who can perform all operations with maximum speed, then it is better to turn to professionals. Computer help, calling a master is a fairly quick process that does not take much time, while the customer will save his money, since he does not have to spend money on dismantling / installing equipment, as well as on transportation.

Computer help at home in Moscow is an ideal option when you urgently need to restore the settings of the router, server, printers and scanners. If you need professional computer help, calling an experienced foreman who will provide prompt repair and restoration of the equipment is a must.

What do you get by ordering computer assistance at home? First of all, it is the security of your personal data, and secondly, it is a solution to even the most difficult problem in a limited period of time. In addition, you pay for services only after you have received them, and not in advance, as is the practice in many service centers.

Urgent computer assistance at home from the specialists of HelpIT.me is an opportunity to consult with specialists by phone. Perhaps you can fix the problem yourself by following the instructions of our staff. We are ready to provide computer assistance at home! To do this, simply call the phone numbers indicated on the website or in any other way.

Planning and maintaining Wi-Fi networks

For the corporate market, such activity is a necessity. Thus, standard solutions for the home are not able to provide and satisfy the entire range of business needs. The planning and deployment of wireless networks in buildings and offices is carried out using special technologies that can simplify access to a wireless network, as well as improve the quality of operation of such a network. For example, Cisco offers spectrum analyzers that are designed for access points. By using such analyzers, the equipment automatically switches to interference-free channels. The use of BeamFlex antennas allows for a unique range of coverage as well as unprecedented quality. Large office, business center, corporate network may need an architecture without controllers, having centralized management. In addition, it must be said that today technologies are becoming relevant solutions that allow focusing the signal only for the necessary access points.

Setting up a wireless Wi-Fi network in Moscow is inexpensive - it is possible for our company's clients. Before we perform the maintenance of the Wi-Fi network, we sign a contract with each of the clients. On the basis of such a contract, planned preventive work is carried out, malfunctions are eliminated, and equipment is administered. Our services have significant advantages for you. This is the ability to manage the connection, save on various additional services. You can also find out the behavior of your customers by analyzing the statistics of ongoing connections. Our service will allow you to establish a reliable Internet connection, improve the signal for access points, expand the network and perform many other services that are so necessary for business network administrator task.

Due to the fact that our specialists have a high level of training and colossal experience in providing services such as servicing Wi-Fi networks, we can guarantee that companies who contact us will receive security and reliability, flexibility of solutions, and, if necessary, interconnection of networks (wired, wireless), mobility.

The standard subscriber service includes such works as monitoring and diagnostics of the network for operability, the use of software visualization, which allows analyzing complex networks. Coverage maps are also studied and built, the radio signal level is investigated to identify sources of interference, software and security related software are checked. Additionally, all problems that were identified during the setup and operation of networks are eliminated.


Tuesday, July 21, 2020

What is computer system maintenance?

System service includes comprehensive maintenance of computer equipment, technical support, scheduled and urgent calls, installation of licensed software and many other services. Including you will be provided with services such as the organization of Wi-Fi networks, setting up backup, preventive measures for computer equipment and components, server maintenance.

We also specialize in providing the following services: Network administrator roles and responsibilities

installation of antivirus software; 

diagnostics and repair of peripheral equipment;

connection to a local network and the Internet;

consulting work and training of employees of the organization;

Providing your customers with an organized emergency service and technical support.

Service of computers of organizations in Moscow is one of the directions of our company. There are several reasons to entrust the comprehensive computer service to HelpIT.me. First of all, we solve all the IT tasks assigned to us. Secondly, you will be provided with a comprehensive computer service - a program that will ensure the smooth operation of the computer park regardless of external circumstances, emerging work problems and other reasons.

In addition, complex subscription service for computers is also information support for your business. We will negotiate with IT service providers, resolve issues online, and provide unlimited remote support.

Our experts hope you find this computer services overview article helpful. After all, only here you can find out that in fact a good IT administrator only needs to configure everything once, so that the rest of the time the equipment works properly and without failures. Our specialists will only come from time to time to troubleshoot, reconfigure the network, install new programs and applications.

Clients need to know what makes us different from others. First of all, we can offer comprehensive computer services, which means that with changes in the computer park, with more complex work with equipment than established by standards, we will not leave you alone with the problem, but will definitely come to the rescue.

Comprehensive computer service is work that combines many operations into a whole complex. This includes technical work, software customization, and activities aimed at supporting the operation of the server room. You will be able to choose the type of software that is ideal for your company. As with any other equipment, it is very important for computer equipment that preventive work is carried out on time. In the process of cleaning, diagnosing, removing unnecessary programs, you get the opportunity to extend the service life of the equipment, to provide yourself with efficient equipment that will not fail at the most unexpected moment.

Additionally, our specialists provide detailed recommendations on how to use the newly installed software, what programs should be used to optimize activities, etc.

If suddenly in the process of work there are accidents or unexpected failures in the network or the entire system, an employee of our organization immediately goes to the site to fix the problem, if it cannot be solved remotely.

Calculate the service cost using our online calculator. To do this, just select the required number of workstations, the number of servers, indicate the additional services that will be included in the service, and you will find out the preliminary cost of our service. Contact us! We are confident that with us your business will become even more successful.   

Monday, July 20, 2020

Computer service offer

Computer service offer

It is important to understand that an opinion about a company can be formed by what kind of commercial offer it offers. What can we offer for optimization and business development? First of all, it is the analysis and evaluation of the existing IT infrastructure of your company. Secondly, we provide recommendations for upgrading your computer network. Thirdly, we are ready to provide a plan that will improve the efficiency of server hardware and network equipment. In addition, we offer methods to minimize crashes of various programs, systems, computer equipment. We also provide services that include recommendations and advice on purchasing and upgrading computer hardware and software. In addition, we provide operational assistance related to any issues in the field of IT.

Commercial offer for computer equipment administrators definition

If your organization has a whole fleet of computers, as well as various computer equipment, then you cannot do without the help of a qualified specialist. Outsourcing, maintenance of the company's IT infrastructure is a very important aspect that should not be neglected. We are ready to offer you services that are difficult to refuse, especially since such services are not very expensive, and also significantly increase the efficiency of your organization. We carry out not only standard computer maintenance, but also subscription services on favorable terms for you. Thanks to such working conditions, the system will be cleaned in a timely manner to cool servers, computers, and the central processor, power supply unit and other components will not overheat. Respectively,

Thursday, July 16, 2020

What are the system administrators?

Quite often, many managers and company employees themselves perceive administration differently. It cannot be said that some of them are right, and some are not. There are a variety of specialists in this field who perform various tasks. So, there are experts who are called technical support staff. They accept applications from users, fix small problems in the network within the serviced system. If such a specialist can not cope with the task or she is not in his competence, then he sends an appeal or application to the profile specialist, who is part of the company’s team.

Another profession in the field of system administration is the network administrator. Such specialists are responsible for network performance. They work not only with connecting a computer, but also perform many other actions. This may be setting up a connection to offices, setting routing rules, monitoring the operability of network equipment and urgently fixing problems with its operation.

Also, administration involves the work of such a specialist as a Windows administrator. Such an employee makes sure that all devices operating on this operating system work correctly. This is software installation, connection, modernization, updating of various applications and services, user login. In addition, such specialists ensure that specific users have access to certain applications and services. It also happens that the administration of workstations and servers is two separate areas, therefore, separate groups of administrators work in such areas. Linux administrators do all the work involved in installing, configuring, and fixing bugs in the Linux operating system.

Administration also includes professionals who are involved in virtualization. So, if several operating systems operate on the same server at once, then they are able to customize the operation of such OS. The specialist shares server resources so that each individual operating system works correctly. This is necessary in order, for example, to have 5-7 different operating systems on one common server. 

Additionally, there is such a direction as database administration. Databases must be used in order to store arrays of information. This can be user information, or it can be information that is used by various programs. Such an administrator configures and installs control systems, maintains them, including diagnostics, optimization, and troubleshooting. Also, the specialist restores the database, performs their backup. Visualization systems, database management systems are different, therefore, ACS specialists can also have different areas of activity networking administrator.

Storage managers work with data warehouses. They serve them, allocate places, carry out data backup. Their work is also aimed at copying data to various storages or in other geographical locations. Such an activity is called replication. It is to such specialists that they go in order to get free space or to get information that backups are being created.

Another area is the unified communications system administrators. They configure, install, configure each individual system, which is associated with telephony, e-mail, voice conferences or, for example, with internal chat. System administrators also include employees who are engaged in equipment. These are engineers who carry out adjustments and repairs of all computer equipment that the company has. For example, if the administrator of the storage system needs to replace the hard drive, then with this appeal he goes to the engineer.

System Administration of Servers and Computer Systems

When network failures often occur, you need to look for the causes of such problems. This may be the old technical base, the low level of user work, as well as poor system administration. Such problems affect not only the performance of the computer network, but can also cause failures and problems in business processes, so you should not ignore all this. You must understand that system administration is not a luxury, but an objective necessity!

This includes all work related to debugging, maintenance, optimization, control, other activities aimed at maintaining the information system. No need to think that this is the usual maintenance of computers and computer equipment. These are versatile processes aimed at using a sound strategy, as well as requiring highly qualified specialists.

What is the advantage of professional system administration, which is performed by qualified specialists? First of all, this is a well-planned process, which involves clear planning, execution and further development. Necessarily sysadmin determines the company's needs for information resources. It also takes into account the specifics of the business, the system of interaction between individual units. Moreover, the organization of a computer network is carried out only taking into account all factors and is considered from different points of view. All systems, regardless of configuration, must be technically reliable and user-friendly. In order for the company’s IT infrastructure development policy to be reliable, it is necessary to conduct an IT audit, which will be the basis for such development.

If we talk about system administration not in general, but as a daily task, then the network status is monitored here, the configuration of all connected devices is carried out, prevention is carried out, various problems are fixed. Also, such work includes setting up software, preventing external attacks, various threats, other types of unauthorized access to the network and internal system.

Wednesday, July 15, 2020

IT Infrastructure Management

IT Infrastructure Management (ITSM)

Today, savings on IT services are inappropriate. It is from this sphere that in most cases the overall performance of the entire company depends. When a company has an office in Moscow, it is necessary to maintain the capacity of such an organization by all means. Otherwise, competition and more favorable conditions from another company will not leave a chance for your organization. Management of IT services and IT infrastructure is an activity that can improve the quality of the services provided. In addition, the effect of investments related to IT infrastructure is enhanced. The development and maintenance of IT systems will also take place, which is very important for a stable and developing organization.

Management of IT processes and enterprise infrastructure is a rather complex process that requires an integrated approach and responsibility, professionalism on the part of the contractor. IT infrastructure management has several main areas. This is management consulting, automation of enterprise processes, IT management functions, management system support, including implementation of solutions, their support and a whole range of other services.

Monitoring and managing IT infrastructure is a modern approach for organizing an IT infrastructure management system. The management of IT infrastructure and its success largely depends on what experience the internal structural unit has or on the professionalism of the company that provides outsourcing services computer network administrator.

What do we offer? The infrastructure management system from our company is characterized by such actions as the management of releases, configurations, changes, availability. Also, IT infrastructure management helps ensure security, which is an important factor for protecting enterprise data. How we are working? The construction and implementation of an IT infrastructure management system is underway. This takes into account the features of the use of software solutions for monitoring and management, which for each company can be completely different. It also implements a data security system, backups, and monitors licenses for installed software products.

Modern IT infrastructure management problems are most often associated with security. Therefore, it is very important to install Service Desk automation, protect applications and data, and establish end-to-end service management. In addition, a whole series of solutions must be installed for the enterprise related to managing configurations of programs, equipment, managing server assets, and other important points that ensure the stable operation of mobile devices and workstations used in the service department.

We use IT infrastructure management tools from leading manufacturers. Those who first encountered IT infrastructure management often cannot understand why you need the best IT infrastructure management practices. The fact is that such practices represent the experience of the most successful companies and enterprises. Thanks to this, you can avoid a huge number of mistakes in the development and current activities of the company, and immediately go on an effective and stable development path.

If we consider the requirements for IT infrastructure management tools, then in most cases they have similar components. First of all, it is automation for installing the OS, applications, various updates. Secondly, the specialist provides automated event processing and statistical data collection. Thirdly, IT infrastructure management systems allow you to manage performance and availability. That is, there is a configuration of computers, various network devices, their automation (turning on, turning off, increasing power), for example, in situations where the load on equipment and networks increases.

Tuesday, July 14, 2020

What is included in the LAN service?

Maintenance of a local network means that the configuration will be performed, support for the operation of servers, various network devices. Also, tuning, support for the operation of computers, various peripheral devices, equipment, and various technical means will be performed. Maintenance of the local network also includes backup, data recovery, training is provided for users working in the company. Maintenance of local computer networks is impossible without activities that support system security. In addition, we can talk about operational visits of specialists in case of emergency, as well as that repair work and many other operations will be carried out.

LAN service (local area networks)

LAN maintenance includes timely diagnostics, protection against hacking, installation, software configuration, advisory assistance, updating the system, network, and many other works. Additionally, the terms of reference (TOR) of the LAN can include upgrading the network, as well as replacing old equipment with new computers, servers, etc.

LAN service: a pleasant trifle or a conscious need?

It is necessary to understand that even a well-designed and tuned LAN cannot exist without a LAN service. LAN service should be performed only by those specialists who have extensive experience in this area. That is why it is necessary to determine in advance who will perform the construction of the local network, and subsequently will be engaged in such tasks as diagnostics and maintenance of local networks. Naturally, a full-time system administrator is needed in the company, but it’s better to direct his efforts towards ongoing work. And maintenance and repair of local networks of the enterprise should be performed by professionals. Even a subscription service to the local area network of an enterprise from a specialized company will cost less than maintaining the staff of its own system administrators, paying holidays, paying taxes for employees.

What is the local computer network used for?

The use of local area networks is necessary in order to effectively conduct business, as well as for optimized distribution of labor resources. Thanks to the local network, various departments of the company interact more closely with each other, all types of equipment, including peripheral, are effectively used. A single database is also created, various information resources, to which distributed access of various user groups is presented. In addition, the creation of a local network allows the departments of the company to interact with various external systems. Additionally, various communication services can be combined into one hardware system.

Necessary precautions when working with a local network administrator certifications

After the construction (installation) of the LAN is carried out, while the users in the company gain access to the Internet, the question will arise as to how secure the use of the local network will be. Naturally, every modern computer has protected software and other security systems, but they cannot protect the internal data of the company from third-party threats with the maximum guarantee. That is why maintenance of the local computer network should be carried out by specialists who can regularly conduct diagnostics, and if necessary, eliminate and level potential threats.

Subscriber services for computer systems (IT outsourcing)

Professional LAN configuration implies that the networks will be arranged so that in the future they can be scaled. This means that the choice and justification of the LAN construction technology occurs so that later it is possible to change various configurations, add equipment, and install more productive systems.

What is included in the subscription service of computer networks

You must understand that for the operation of the LAN, three main components are necessary. These are cable, network equipment and software. All components require adaptation to each other so that close interaction takes place and there is no conflict. For our part, the maintenance of local area networks (LANs) involves monitoring the work of the LAN, leaving a specialist to fix any malfunctions. It is also the organization and configuration of anti-virus protection, software updates, network equipment setup.

Types of work performed

First of all, this is designing, which takes into account all the rules of the law, the wishes of the company, the terms of reference and other factors. Next, design, working, budget documentation is compiled, so you will know not only the services and prices provided, but also the further cost of maintaining local networks. After this, the construction of the LAN, the configuration and subsequent maintenance of the local computer network are carried out.

Maintenance of LAN and SCS also implies two types of work - this is preventive and restoration work. Maintenance of the local network, or rather, its cost will depend on the amount of work, including the composition of the equipment, operating conditions. During preventive maintenance, diagnostic operations are carried out to a greater extent, the damaged ports are restored to operability, and cable organizers are installed. Recovery work is not only setting up and maintaining a local network, but also eliminating all malfunctions, restoring and replacing all the necessary equipment, cables.

Monday, July 13, 2020

Creation of IT infrastructure

Complex IT infrastructure at the enterprise
The company's IT infrastructure may contain the following elements:

Server Infrastructure:
Virtualization (HyperV, ESX)
Email (MS Exchange 2007, 2010, 2013, Exchange Online, Google Mail, etc.)
Centralized work and remote access (MSTerminalserver, Citrix)
Creation of domain infrastructures and networks (Microsoft server versions 2003, 2008, 2012)
Building fault-tolerant server systems (cluster models)
Centralized printing systems (logging and control of printing at the enterprise)
Internet access
Local file services, DFS
FTP services
DBMS (MS SQL 2005, 2008, 2012)
Network Infrastructure:
Building Distributed VPNs
Fault Tolerant Distributed Networks
Thin clients for employees (increase of safety and reliability of workplaces)
Increasing mobility of employees
Wireless networks (Wifi / Bluetooth)
Security Systems:
Dual Authorization Systems (E-token)
Biometric Authorization Systems
Antivirus protection (centralized or distributed)
Spam Protection
Internet traffic control
Monitoring and control of workstations
Automated Rights Management Systems (MSRMS)
Telephony:
Building budget systems
Building Distributed Systems (AVAYA)
IVR Voice Menu Systems
Voice mail
Recording and monitoring telephone conversations
Integration with 1C
The process of creating / modernizing the company's IT infrastructure

Identification of business needs
Survey of key business users of the company
Description of business processes (if necessary)

Designing Future IT Infrastructure
Analysis of the information received
Detailed study of the project for future IT infrastructure

Building IT infrastructure
Implementation of infrastructure creation in accordance with the approved schedule

Warranty support for the created IT infrastructure
We give 3 months warranty for our work.
When concluding a service contract, the warranty period is extended
Project Options:
Organization of IT infrastructure from scratch
Modernization of existing IT infrastructure in order to: Network administration
Cost optimization
Improving the efficiency of IT services
Risk reduction
Increased security
Cost / loss reduction
Reorganization of IT infrastructure to the needs of your business
Getting new business opportunities
Service Quality Improvements
Improving the quality of services for your customers
Increasing core business performance
Offers new services to your customers
IT infrastructure design
Designing an IT infrastructure primarily depends on your model:

One office
Office + warehouse / Office + office
Companies with a branch-distributed structure (central office + several departments / shops / offices)
From the goals that you pursue:

IT cost reduction / optimization
Improving the quality of IT services
Business performance improvement
Getting new services for you / your customers
From the method of its creation:

Modernization of existing
Reorganization (adding elements) to the existing infrastructure

Friday, July 10, 2020

DIRECTEUR DES SYSTÈMES D’INFORMATION (DSI / CIO)

Le DSI ou Directeur des Systèmes d’Information (ou Chief Information Officer) est responsable de l’ensemble de l’équipement matériel et de la transmission de l’information au sein d’une organisation. Il est également en charge de définir une politique informatique en conformité avec la stratégie globale de l’entreprise.

métier DSI infographie
QU’EST-CE QU’UN DSI ?
Le DSI est un poste clé dans la stratégie et l’organisation. Sa fonction est d’abord stratégique puisque le DSI a pour objectif de définir et de déployer un système d’information efficace pour appuyer les équipes métiers. Ce plan de déploiement doit néanmoins s’inscrire en continuité de la direction générale et de ses objectifs de performance. Il joue donc un rôle important dans l’organisation de l’entreprise ainsi que dans la stratégie de production. Dans cette perspective, le DSI siège au comité de direction.

Aussi, il s’agit d’un poste technique dans le choix des technologies utilisées, tant sur l’informatique que sur les télécommunications. Sa fonction consiste à introduire durablement le matériel technologique nécessaire au bon fonctionnement de l’entreprise. En effet, l’ensemble du matériel utilisé par les employés est mis en place par la direction des systèmes d’information (DSI). Du matériel tel que les postes de travail individuels, les logiciels, les solutions de stockage, le réseau internet, les serveurs… Ainsi, tout le système d’information est l’Å“uvre de la DSI, qui devra garantir une maintenance continue des différents services informatiques offerts aux employés de l’organisation.

Enfin, le DSI est également en charge de définir une charte informatique qui englobera les droits d’utilisation, les usages des technologies utilisées, la sécurité informatique et les questions de confidentialité information technology architect jobs.

De toute évidence, le Directeur des Systèmes d’Information est à la tête d’un service qu’il manage. Ceci afin de mener à bien ces missions, ce qui nécessite des compétences managériales.

De plus, son rôle s’étend également à l’anticipation des changements technologiques au sein de l’organisation. D’une part, le DSI est obligé de s’adapter en permanence à l’environnement technique exigé par l’activité de l’entreprise. Il a un rôle crucial à jouer dans l’innovation de l’entreprise et l’amélioration constante des processus de production. D’autre part, il doit également assurer les transitions technologiques et projets informatiques de grande ampleur.

MISSIONS DU DSI
Audit de l’efficacité du système d’information actuel et étude d’axes d’amélioration,
Orientations stratégiques des installations techniques élaborées avec le comité exécutif,
Reporting détaillé du circuit de transmission de l’information au sein de l’organisation et axe d’optimisation / de refonte des flux de communication,
Etude des besoins exprimés par les directions métiers,
Évaluation des risques et gestion de la sécurité informatique, stockage des données, charte informatique, confidentialité / partage de certaines informations,
Direction du déploiement du système d’information,
Collaboration avec les différents services de l’entreprise pour former, informer et transformer les processus de transmission de l’information,
Organisation de la maintenance des systèmes d’information et management des équipes,
Élaboration et suivi de projets relatifs aux transformations du système d’information,
Rôle de conseil auprès de la direction générale au sujet des changements technologiques,
Anticipation des opportunités technologiques à venir,
Veille technologique et juridique approfondie du secteur du numérique.
ÉVOLUTIONS DU DSI
La perspective de transformation numérique des entreprises tend à donner de l’ampleur au rôle de DSI. Sa fonction n’est donc plus considérée comme un service support de l’activité de l’entreprise mais s’inscrit au contraire comme partie intégrante de la direction. Il pourra en partie prendre en charge les mutations liées à l’amélioration des processus métiers et opportunités technologiques.

Toutefois, le poste de DSI est en situation critique. Face à de très gros enjeux d’évolution pour l’entreprise, le DSI peut changer rapidement.

PROFIL DU DSI
Le Directeur des Systèmes d’Information est généralement issu d’une école d’ingénieur ou d’un cursus informatique équivalent (Bac +5). Il doit également justifier d’une expérience forte au sein d’un service informatique, en gestion de projets SI ou en développement informatique.

SES COMPÉTENCES
Connaissance des systèmes d’information et, plus largement de leur utilisation au sein de l’entreprise,
Compétences de manager,
Gestion de projets de grandes ampleurs sur l’installation / la transition vers de nouvelles technologies,
Culture des technologies.

Thursday, July 9, 2020

SOFTWARE ENGINEERING AND WEB DEVELOPMENT

Training aims
The production of a software or a web application is a very varied task using several resources, notably human, material and technological.

The Software Engineering and Web Development option aims to provide students with in-depth skills to be able to intervene in all phases of software production or web application: specification, design, implementation of software architectures and Web technologies.

Opportunities
The graduate computer scientist in Software Engineering and Web Development will have the vocation to be recruited in the following positions: IT architect job description

JEE Web Application Architect
Mobile application designer and developer
IT Project Manager or Consultant
Training managers
For more information please contact:

Center I S GA Rabat: M. HARCHI Said
Center I S GA Casablanca: M. Nabil CHERKAOUI
Center I S GA Marrakech: M. Yassine SAFSOUF
Center I S GA Fès: M. Rachid NAOUAL
Center I S GA ElJadida: Mr. Sabri Yassine
Programs
1st YEAR2nd YEAR3rd YEAR4th YEAR5th YEAR
1st YEAR
Semester 1:
Culture and communication
English
Algebra
Analysis
Boole algebra
Combinatorial logic
Algorithmic
Matlab programming
Mini projects
Semester 2:
Culture and communication
English
Analysis
Algebra
Electrical circuits
Sequential logic
Algorithmic
Programming C
Mini projects
Optional internship

Wednesday, July 8, 2020

Cybersecurity Engineer

Do you want to be at the heart of the weapons system, represent the values ​​of ArianeGroup on the base, work in a high-tech field?

We offer you a position of "Cybersecurity Engineer" oriented electronic and computer products.

Integrated on the Brest site and in relation to that of Les Mureaux, your mission will be to:
- Contribute to integration, validation, SSI qualification (PC, bays, hard disks, physical media ...) means deployed at the Operational Base.
- Maintain in safety conditions the means used at the operational base (ground & on board) by integrating risk analysis and SSI requirements.
- In collaboration with the OSSI, carry out incident responses (log analysis, log collection ...) when the incident concerns the product and as such, maintain and update the SSI investigation cyber security architect

tools.
- Be in interface with the cybersecurity product teams Les Mureaux / Aquitaine and the architect MSBS.
- Support the operational base teams on SSI activities.
- Raise awareness of the SSI of products for all personnel involved in the MCO contract.
- Participate in the continuous improvement of the service by leading and / or contributing to projects.

Qualification

You hold a Bac + 3 / + 5 type of training in the area of ​​network and system security, hardware, operating system and software security.

You have skills in the following areas:
- Cybersecurity: regulations and standards, ideally knowledge of EBIOS methodologies.
- Network security.
- Environments: Windows and Linux.
- Vulnerabilities.
- Programming: Script bash and Shell.
- Collaborative tools.
- Continuous improvement initiatives.

You are able to communicate in English (oral and written).

Responsive and pragmatic, you have developed both technical and professional rigor.

Force of proposal, you also know how to take initiatives and work independently.

You have an increased analytical mind and a certain capacity for solving problems.

Teacher and attentive, you appreciate teamwork.

Additional information
- Position based on the ArianeGroup Brest site - Crozon operational base (29).
- Type of contract: CDI.
- Position to be filled as soon as possible.
- Travel to be planned on the ArianeGroup Les Mureaux site (78) - On average once a month.
- Permanent employee.

Tuesday, July 7, 2020

Airbus difficulties are also a disaster for subcontractors in the air sector

The European manufacturer must detail its social plan which will result in the loss of 15,000 jobs worldwide. But it is also the giant's subcontractors who are worried about their future.
Whether manufacturing metal parts, or leading edges for the wings, Airbus subcontractors already know that the next few years will be difficult.

For these SMEs or mid-caps, aeronautical activities represent, according to INSEE, 70% of their turnover. Consequently, "when Airbus coughs, everyone is sick," summed up the president of the Toulouse Chamber of Commerce and Industry.

Dependence on Airbus test architect roles and responsibilities
The good health of these companies is directly linked to manufacturing volumes and "if Airbus makes 60 planes" explains a subcontractor, "we make 60 parts, if Airbus makes 40 we make 40".

The dependence is very strong: an Airbus is 80% manufactured by subcontractors. Suffice to say that Airbus' announcement to maintain a production rate at only 40% of normal until 2021 will therefore have direct repercussions on the entire industry.

Murderous summer
The biggest players, like Safran, will resist. But the little ones will suffer, or worse file for bankruptcy. Derichebourg, Sogeclair Aerospace, Scalian… In recent days, announcements of social plans have been accelerating. "Consolidation will accelerate. The landscape of aeronautical subcontracting will change" explains an expert in the sector. Until then, we will have to resist a deadly summer.

Airbus announced a vast social plan on Tuesday with the elimination of 15,000 jobs, including 5,000 in France. The epidemic has put airlines around the world in serious trouble, dragging Airbus into this downward spiral. The European automaker is to present details of its plan this Thursday.

Monday, July 6, 2020

From pilot initiative to periodic ISPS exercise

Given these premises, the protection of the network infrastructure of an ISPS port facility, as well as having to be subject to security procedures that protect the assets physically, against tampering or sabotage and agents directly on the system hardware , must be the subject also of reaction procedures [15] , connected to the unauthorized access scenarios (eg. unauthorized access ) to the computer system via telematics .

In this sense, reference is made at the regulatory level to Art. 615 ter . of the Criminal Code, titled Abusive access to a computer or telematic system , which punishes the conduct of those who illegally enter a computer or telematic system protected by security measures, or keep there against the express or tacit will of those who have the right to exclude it.

This article, placed systematically in Section IV of the Code - Of crimes against the inviolability of the home , introduces the concept of the so-called IT home , here understood as a protected and identified legal asset, "... as an ideal space in which the data is contained computer systems pertaining to the person, extending the protection of the confidentiality of the individual sphere, as a constitutionally protected asset ", thus drawing a parallel with the real home [16] .

This process of analysis, pending specific additions to the legislation, could allow PFSOs of port facilities to schedule a penetration test on their ICT systems within quarterly exercises ( drills ), to be repeated in the quarter of the following year . In this way, what originates as a pilot action carried out only by some virtuous ports, could consolidate itself as a peculiar and repeatable exercise scenario over time security architect job.

The hypothesized initiative could also represent a useful option in order to reduce the risk of resorting to very often repetitive and / or insufficiently realistic scenarios, as evidenced by the recent inspection activity carried out by the General Command of the Port Authorities, in the ports and in national port facilities [17] .

Finally, including penetration tests in quarterly drills would mean creating new synergies with the corporate ICT functions, contributing to the development of an internal group capable of jointly developing and improving practices and prevention measures suitable for inclusion in Port Facility Security Current plan .

NOTE
See, General Command of the Port Authorities, Security Title Circular no. 40 of 29/03/2018, Maritime cyber risk management . ↑
See, Recital 10, Directive (EU) 2016/1148 of 6/07/2016. ↑
ENISA publication : "The European economy is therefore critically dependent upon the maritime movement of cargo and passengers. On the other hand, the maritime activity increasingly relies on Information Communication and Technology (ICT) to optimize its operations, like in all other sectors. ICT is used to enable essential maritime operations, from navigation to propulsion, from freight management to traffic control communications, etc ". ↑
The Cooperation Program approved by the European Commission with decision C (2017) 6247 of 09/14/2017. ↑
In the Italian part of the Program area, the ports of Venice (2,000,000 m²) and Trieste (1,725,000 m²) have the largest areas dedicated to goods storage. In addition to this, in particular for the port of Venice, there is the considerable increase in cruise traffic, which is undoubtedly capable of stimulating the tourist activities of the ports in question. The port of Koper is one of the main logistics and distribution centers and plays a leading role, holding since 2010 the largest market share in the Upper Adriatic. ↑
This aspect is important because additional and uncoordinated security measures often result in a slower management of port operations and therefore in a less attractive port. ↑
According to ENISA , "Penetration testing is the assessment of the security of a system against different types of attacks performed by an authorized security expert. The tester attempts to identify and exploit the system's vulnerabilities. The difference between a penetration test and an actual attack is that the former is done by a tester who has permission to assess the security of the system and expose its security weaknesses. In addition the tester is given certain boundaries to operate and perform this task ". ↑
As regards the Port of Trieste, a first pilot action concerns the implementation of a console for managing data from two distinct IT systems, which are jointly able to offer a high and complex set of data, the study of which would allow maximize the control of presence in port, also with a view to supporting management decisions and handling emergencies. ↑
The second pilot actionplaced in charge of the ADSP MAO of Trieste has been focused on the so-called Security & Compliance Consulting services and in particular is aimed at ensuring the adaptation of the IT infrastructure of the Port of Trieste with respect to the provisions of: Regulation (EU) no. 2016/679 relating to the protection of individuals with regard to the processing of personal data (so-called GDPR); Legislative Decree no. 196/2003 (the so-called Privacy Code), in particular as regards the directive on monitoring access by system administrators. Thanks to the SECNET project, an important assessment document was therefore drawn up, the '' Port of Trieste Security Assessment - Cyber ​​Risk Management '', which reconstructs the state of affairs of the Port of Trieste. ↑
See, Annex 6.1., Study of best practices in ICT systems used for port security , pp. 38 et seq .As highlighted, most of the ports surveyed have adopted a cyber security plan, accessible to all employees and regulating the responsibilities and obligations of individuals. Behavioral procedures have also been introduced in the ports of Valencia, Varna, Burgas and Capodistria in the event of cyber accidents, which include the recognition of intrusion attempts in the system and the transmission of alarms to the reaction team. Only two ports (Koper and Burgas) analyze the attacks systematically. The data collected indicate that not even half of the ports surveyed regularly carry out a cyber security risk assessment. Only a few ports include software and hardware vendors in the security assessment.. ↑
See, Par. 18.4, "The exercises and trainings aim to ensure that the staff of the port facility is able to perform the security tasks entrusted to them at all security levels and to identify any gaps in the security system that need remedy " . ↑
See, Art. 8, Paragraph 6 of Legislative Decree no. 203/2007. ↑
Significant extension of security obligations to all operations, including radio and telecommunication systems, IT systems and networks, for ports and port facilities. See Recital 10, Directive (EU) 2016/1148 (so-called NIS Directive). ↑
See Section A / 15.5, ISPS Code and Security Title Circular no. 40 of 29/03/2018. ↑
The implementation of which is mainly entrusted to the ICT staff and, as a possible support, to the staff of the PFSO office if present. ↑
See, Criminal Cassation section a. No. 17325 of 03/26/2015. Furthermore, the case referred to in art. 615 ter, provides for an aggravating hypothesis if the criminal conduct is carried out to the detriment of public interest IT systems (paragraph III). This also assumes importance with respect to the definition of "Operator of essential services", in the NIS Directive. 

Friday, July 3, 2020

Ransomware, cryptocurrency miners and backdoors

The data encryption and subsequent extortion is not the only scenario that could follow a commitment via RDP. Attackers often attempt to install malware to mine cryptocurrencies or create a backdoor, which can be used by attackers if the victim has identified and closed unauthorized RDP access.

Other common scenarios that can occur after the RDP commitment are: How to become a security architect

delete log files, thereby removing evidence of previous malicious activity,
download and execute on the compromised system tools and malware according to the attacker's choice,
disable or completely delete scheduled backups and shadow copies , also known as snapshots,
exfiltering data from the server.
As shown in this publication of 2013, cybercriminals have been trying to exploit the RDP for several years. The growth in the number of attacks on RDPs in recent years has been the cause of numerous security alerts published by different government entities, such as the FBI , the NCSC of the United Kingdom or the ACSC of Australia.

This just goes to show how important remote access security has become, as it can potentially make or break a company's future. And even if damage to an organization's reputation can be managed, there are financial losses, stagnant operations, and costly recovery efforts that must be considered. This does not consider the additional costs as a consequence of possible sanctions that the authorities may issue in accordance with the applicable data protection legislation, such as the GDPR (EU), CCPA (California) or NDB (Australia).

Whether there is a pandemic or not, companies must manage the risks posed by the widespread use of RDP or other similar services by strengthening their passwords and adding other additional layers of security, including multi-factor authentication and a security solution that protects against attacks. based on RDP and similar protocols.

Wednesday, July 1, 2020

Administrator and Data Architect

Duvaltex is currently embarking on a major digital transformation. The large-scale and inspiring IT projects in which you will come to realize and evolve will succeed for several years. The culture of innovation at Duvaltex is transmitted in the IT department, with the Devops approach and the use of modern development tools.

Reporting to the development team leader, you will be responsible for implementing and maintaining good optimization and data management practices. The integrity and security of all of the company's databases.

The person sought is autonomous and efficient. She is able to quickly acquire new knowledge and skills. She has an excellent ability to adapt to new tools, languages ​​and methodological orientations in the field of IT, as well as a good sense of planning and organizing her work. She must be creative and initiative in problem solving and know how to prioritize based on planned work and the unexpected. She has good communication skills, both oral and written it security architect.

Main responsibilities:
Define and schematize the data structures, and keep the documentation up to date;
Ensure data integrity and security;
Ensure consistency of relationships between databases;
Develop and maintain OLAP cubes for different business units;
Support IT business analysts and data scientists in the evolution of reports and the BI tool;
Support programmers with best practices for accessing data (query optimization, etc.);
Develop stored procedures and functions;
Manage security backups, DB access rights and replications;
Reverse engineer old BDs when necessary.

Profile sought:
Good analytical mind and creative approach to problem solving;
Willingness to obtain results, structured, attentive to details and quality;
Ability to plan and manage time while working on multiple projects simultaneously.

Skills:
University degree in computer science or any other relevant training;
Minimum of 5 years of experience in database management;
Mastery of MS SQL technologies (Mandatory);
Experience with Azure technologies;
BI tool experience (asset).