Atif  Anwaar
Wednesday 07, May 2025

IT Network Security Administrator  

Karma Software Solutions

Lahore, - Pakistan - 150k to 200k (PKR) - Per Month

Student Evening Shift Temporary/Contract

Job Details

Category:
Information Technology
Career Level:
Experienced (Non-Managerial)
Experience:
Student
Required Qualification:
BSIT, MSIT
Requires Traveling:
No
Salary:
150000 - 200000 PKR
Salary Type:
Per Month
Total Vacancies:
1
Skills
voipdesignvoicequalityconnectivityperformanceequipmentgroupmonitorusersystemdisaster recoverytechnical supporthardwarecloudinfrastructureazuredigitaloceanproductionserverlinuxbusinesscomponentsapplicationnetworkingstoragesecurityenvironmentdatabackuprestorationhostmanagerclienthostingdomain registrationoptionsdomainautomationsetupsuspensionterminationsoftwarecontentcheckmachineareatroubleshootingalertsesxihypervisorphysicalguestoperating systemsrecoveryresourceusagepoliciesshapingwindows serveractive directorygroup policymanagementcomputerantivirustoolssharesaccessaccess controlproceduressolutionsdata integritycaselossresource utilizationperformance tuningmonitoringremote desktopremote accessisolationcommunicationauthenticationauthorizationloggingweb contentwebsitesql serverdatabasescheduledatabase maintenanceindexstatisticsbuildpackagingdeploymentcollaborationdevelopmentvisual studiosonicwall firewallbasicinterfacescontrolflowfirewallpreventionlinecontent filteringonlinecontrollingeventshigh availabilityfailoverfirmwaremakeend user supportsupportdeskservice deskprintersoperatingassistanceemailconfigurationremote supportcctvcameralayoutvideorecordingretentionsurveillancecctv systemlinux administrationfile systemback officeattendance systemcontrollerendpoint securityinstallationprotectionemail securitynetwork administration

Description

Timing pm to am

JOB RESPONSIBILITIES

VOIP:
 Design, implement, and maintain VoIP networks and systems.
 Troubleshoot and resolve issues related to voice quality, connectivity, and performance.
 Configure and manage VoIP equipment, such as IP phones. SIP. Trunks, IVR and Ring Group.
 Integrate VoIP with existing systems
 Monitor and analyze network traffic to optimize VoIP performance.
 Administer and maintain VoIP servers.
 Manage user accounts, extensions, and permissions on the VoIP system.
 Conduct regular backups and implement disaster recovery plans.
 Provide technical support to end-users for VoIP-related issues.
 Diagnose and troubleshoot problems with voice quality, call connectivity, and hardware.’
 Sip Accounts
Cloud Infrastructure:
 Azure, Kamatera, Digital Ocean
 Production Window server with IIS
 VOIP on Linux
 WHMCS on Linux
 Staging servers with IIS
 Collaborate with stakeholders to understand business requirements.
 Select appropriate cloud services and components based on application needs.
 Configure networking, storage, and security settings within the cloud environment.
 Monitor and respond to security incidents, conduct regular audits, and implement security patches.
 Develop and implement disaster recovery plans for cloud-based systems.
 Ensure data backup and restoration processes are in place.
(Web Host Manager Complete Solution) WHMCS
 Set up new client accounts in WHMCS.
 Define and configure hosting plans, domain registration options, and other products/services.
 Integrate domain registration services and manage domain registrations for clients.
 Automate domain renewal processes and manage domain expiration notifications.
 Implement automation for common workflows, such as account setup, suspension, and termination.
 Implement security measures within WHMCS to protect client data.
 Address and resolve issues related to WHMCS functionality.
 Keep WHMCS software up-to-date by applying patches and updates.
 Take regular backups of client websites, databases etc.,
 Co-operate and help team to develop websites, content and others features/plugins.
Host/Servers
 Check and implement security measures on both hosts
 Configure multi-RAID on fresh machine and install virtual environment
 Migrate vm from old host to new host
 Create backup and disaster plan for both virtualized hosts.
 Manage storage on both hosts with NAS.
Network Area Storage (NAS)
 Troubleshooting and resolve issues
 Monitor alerts and take action as per need
 Update time to time
 Secure all data and manage permission as per need
VM Ware ESXI and Hyper-V
 Install and configure the ESXi hypervisor on physical servers.
 Set up and configure host networking, including NIC teaming and VLANs.
 Configure storage options, including datastores for VMs.
 Create, configure, and manage virtual machines.
 Install and configure guest operating systems on virtual machines.
 Manage VM snapshots for backup and recovery purposes.
 Allocate CPU, memory, and storage resources to virtual machines.
 Monitor resource usage and performance of VMs.
 Configure virtual networks, including switches and routers, within the ESXi environment.
 Adjust resource allocations based on changing workload requirements.
 Implement and manage network policies, such as security and traffic shaping.
 Apply patches and updates to address security vulnerabilities.
Window Server
 Install and configure Windows Server operating systems on physical and virtual machines
 Set up and configure server roles and features based on organizational needs.
 Configure and manage Active Directory services, including domain controllers.
 Create and manage user accounts, groups, and organizational units (OUs).
 Implement Group Policy Objects (GPOs) for centralized management of user and computer configurations.
 Implement and maintain security best practices for Windows Server environments.
 Install and configure antivirus software and other security tools.
 Set up and manage file shares for data storage and access.
 Implement and troubleshoot network policies and access control.
 Perform regular backups and test restoration procedures.
 Implement backup solutions to ensure data integrity and recovery in case of data loss.
 Monitor server performance and resource utilization.
 Identify and troubleshoot performance issues.
 Implement performance tuning measures based on monitoring data.
 Keep servers up-to-date with the latest security patches and updates.
 Configure and manage Remote Desktop Services for remote access.
IIS
 Customize IIS settings based on the requirements of hosted applications.
 Create and configure websites within IIS to host web applications.
 Deploy and manage web applications on IIS servers.
 Configure virtual directories and application pools for optimal application isolation.
 Configure and manage SSL/TLS certificates for secure communication.
 Renew and update SSL/TLS certificates in a timely manner.
 Configure authentication and authorization settings for websites and applications.
 Implement IP and domain restrictions for access control.
 Monitor IIS logs to identify issues, analyze traffic, and track user activity.
 Enable and configure logging for websites and applications.
 Implement backup solutions for IIS configurations and web content.
Websites Deployments
 Efile staging and production Website web deployed.
 Eworkforcepayroll staging and production Website web deployed.
 Accountbluebook staging and production Website web deployed.
 MaxoutCrm staging and production Website web deployed.
 EMS staging and production Website web deployed.
 Configure and manage SSL/TLS certificates for secure communication.
 Renew and update SSL/TLS certificates in a timely manner.
 Configure authentication and authorization settings for websites and applications.
 Implement IP and domain restrictions for access control.
 Monitor IIS logs to identify issues, analyze traffic, and track user activity.
 Enable and configure logging for websites and applications.
 Implement backup solutions for IIS configurations and web content.
SQL
 Install and configure SQL Server instances on servers and end users.
 Configure server and database settings based on organizational requirements.
 Design and create new databases based on application and business requirements.
 Implement security measures to protect databases and sensitive data.
 Develop and implement backup strategies to ensure data integrity.
 Test and validate database recovery procedures.
 Monitor database performance and identify bottlenecks.
 Optimize queries and indexes for improved performance.
 Schedule and perform routine database maintenance tasks, such as index rebuilds and statistics updates.
 Monitor database size and space usage.
TFS
 Create and configure build definitions for compiling and packaging applications.
 Automate deployment processes for different environments.
 Use pull requests for code reviews and collaboration.
 Integrate with popular development tools, such as Visual Studio, Visual Studio Code, and various IDEs.
 Manage user access and permissions for different team members.
 Implement regular backup procedures for TFS/DevOps data.
SonicWall Firewall
 Install and set up SonicWall firewall devices in the network.
 Configure basic settings, including network interfaces, IP addresses, and system preferences.
 Define and manage security policies to control traffic flow.
 Configure firewall rules for allowing or blocking specific services, applications, or traffic types.
 Implement access control policies based on user roles and groups.
 Configure and manage intrusion prevention settings for VOIP smooth line communication.
 Implement content filtering policies to control access to websites and online content.
 Define policies for controlling and monitoring application usage.
 Set up logging to capture firewall events, alerts, and security incidents.
 Configure and manage high availability settings for redundancy and failover.
 Regularly check for and apply firmware updates to ensure the firewall has the latest features and security patches.
 Regularly back up firewall configurations to facilitate quick recovery in case of failures or replacements.
Servers Monitoring
 Space, Alters and Storage issues
 Live Monitoring.
 Security.
 Make zero-trust policy for servers.
 Make a Secure Policy for the company security and deploy
End user support
 Provide frontline support through a help desk or service desk.
 Diagnose and resolve hardware and software issues reported by end users.
 Investigate and troubleshoot problems related to applications, operating systems, and devices.
 Install, configure, and update software applications on end-user devices.
 Provide support for desktops, laptops, printers, and other hardware devices.
 Perform hardware installations, upgrades, and replacements.
 Support end users with operating system-related issues.
 Provide assistance with email setup, configuration, and troubleshooting.
 Troubleshoot network connectivity issues for end-user devices.
 Provide remote support to end users who are working from different locations.
CCTV Camera / DVR
 Plan and design the layout of CCTV systems based on security requirements.
 Install and set up CCTV cameras, DVRs/NVRs (Digital Video Recorders/Network Video Recorders), and other related equipment.
 Configure camera settings, resolutions, and recording parameters.
 Manage storage solutions for recorded footage.
 Configure storage settings, retention policies, and backup procedures.
 Set up remote monitoring capabilities for real-time surveillance.
 Configure access controls to restrict unauthorized access to the CCTV system.
 Provide playback capabilities for reviewing historical footage.
Linux Administration (AlmaLinux , Rocky Linux , or CloudLinux™ )
 Install and configure Linux operating systems on Cloud Servers.
 Set up and customize system settings based on organizational requirements.
 Create and manage file systems, partitions, and disk quotas.
 Monitor and optimize file system performance.
 Resolve package dependencies and ensure system stability.
 Implement security best practices to protect Linux servers.
 Configure and manage network interfaces, IP addresses, and DNS settings.
 Install and Configure WHMCS on Linux latest flavor
 Install and configure VOIP Vital PBX on Linux latest flavor
 Develop and implement backup strategies for data and system recovery.
Time Attendance Machine (Back office and Front Office)
 Install and set up time and attendance machines in appropriate locations.
 Configure basic settings such as date, time, and display options.
 Ensure accurate synchronization of employee data between systems.
 Enroll employees in the time and attendance system.
 Capture and store biometric or card-based identification data.
 Provide training to employees on how to use the time and attendance machines.
 Monitor and track employee attendance and punctuality.
 Configure and manage employee work shifts.
Company Custom Applications
 Provide ongoing support for end-users regarding company custom applications.
 Troubleshoot and resolve application-related configurations problems.
 Configure and manage SSL for custom applications on IIS timely.
 Develop and maintain disaster recovery plans for custom applications.
Feature Tasks/Project
 Upgrade/Migrate Linux from old expired version to new Linux versions
 Install and manage WHMCS on upgraded or migrated Linux
 Install and configure VitalPBX on newly installed Linux OS.
 Configure Multi RAID Controller on Fresh Host
 Migrate and divide vm’s on both hosts.
 Configure SonicWall Firewall with both ISP
 Buy new window VM and Install/Configure Server
 Migrate Existing Machine IIS including Applications and Databases to new fresh IIS.
END Point Security
 Deploy endpoint security antivirus software to all devices within the network.
 Ensure proper installation and configuration on each endpoint.
 Define and configure security policies for antivirus protection.
 Set up scanning schedules, quarantine settings, and threat detection rules.
 Regularly update virus definitions to ensure protection against the latest threats.
 Automate the update process to keep endpoints current with new signatures.
 Monitor endpoints for signs of malware, viruses, and other malicious activities.
 Implement real-time scanning to detect and prevent threats during normal operations.
 Manage quarantined files and take appropriate actions (delete, restore, or analyze).
 Implement backup solutions for critical data on endpoints.
G-Suit
 Create, modify, and delete user accounts within Google Workspace.
 Configure and manage email accounts for users.
 Monitor and address email security, spam, and phishing concerns.
 Integrate Google Workspace with other GoDaddy domains.
 Manage licenses for Google Workspace applications.
 Configure MX records with new domain.
Azure Migration
All server migrations continue.
Sonar Que
Atera (RMM)
Network Administration
 Monitor Network activities
 Try to make network smooth in given resource.
G-Suit
 Create, modify, and delete user accounts within Google Workspace.
 Configure and manage email accounts for users.
 Monitor and address email security, spam, and phishing concerns.
 Integrate Google Workspace with other GoDaddy domains.
 Manage licenses for Google Workspace applications.
 Configure MX records with new domain

Job Specification

Karma Software Solutions is in search of talented and motivated individuals for the post of IT Network Security Administrator in the field of Information Technology in one of their office located in Lahore - Pakistan. The ideal candidate should have bsit, msit qualification and atleast student of experience. The position require voip, design, voice, quality, connectivity, performance, equipment, group, monitor, user, system, disaster recovery, technical support, hardware, cloud, infrastructure, azure, digital, ocean, production, server, linux, business, components, application, networking, storage, security, environment, data, backup, restoration, host, manager, client, hosting, domain registration, options, domain, automation, setup, suspension, termination, software, content, check, machine, area, troubleshooting, alerts, esxi, hypervisor, physical, guest, operating systems, recovery, resource, usage, policies, shaping, windows server, active directory, group policy, management, computer, antivirus, tools, shares, access, access control, procedures, solutions, data integrity, case, loss, resource utilization, performance tuning, monitoring, remote desktop, remote access, isolation, communication, authentication, authorization, logging, web content, website, sql server, database, schedule, database maintenance, index, statistics, build, packaging, deployment, collaboration, development, visual studio, sonicwall firewall, basic, interfaces, control, flow, firewall, prevention, line, content filtering, online, controlling, events, high availability, failover, firmware, make, end user support, support, desk, service desk, printers, operating, assistance, email, configuration, remote support, cctv, camera, layout, video, recording, retention, surveillance, cctv system, linux administration, file system, back office, attendance system, controller, endpoint security, installation, protection, email security, network administration mandatory skills. This is a Temporary/Contract evening shift job.Salary vary between 150k to 200k (PKR) per month depending upon skills and years of experience candidate got.