Information Technology Specialist

Yeo & Yeo HR Advisory SolutionsTroy, MI
11d

About The Position

The Information Technology Specialist will be responsible for the administration, configuration, and support of the company’s core business applications, including Microsoft 365 Business Premium, Slack, Zoom, HubSpot, and other SaaS platforms. This role will also take ownership of the company’s network and cybersecurity operations, ensuring the reliability and security of the office network, employee devices, and remote access infrastructure. The Specialist will also ensure the stability, security, and performance of business-critical applications and systems.

Requirements

  • Bachelor’s degree in information technology, Computer Science, or a related field is preferred.
  • Certifications such as MS-102 (Microsoft 365 Administrator) or the equivalent are required.
  • Proven experience administering Microsoft 365 and other SaaS platforms.
  • Strong understanding of cybersecurity principles, tools, and best practices.
  • Prior experience managing small office networks and remote access infrastructure.
  • Experience supporting Windows/macOS devices and common productivity tools.

Nice To Haves

  • Familiarity with ITIL or other IT service management frameworks is preferred.
  • Experience with automation and scripting for SaaS administration is preferred.
  • Additional certifications in cybersecurity (e.g., CompTIA Security+, CISSP, Microsoft SC-900) are a plus.

Responsibilities

  • Administer and manage Microsoft 365 Business Premium, including Exchange, SharePoint, Teams, and security/compliance features.
  • Configure and support Slack, Zoom, HubSpot, and other SaaS applications.
  • Evaluate and implement new tools and features to improve productivity and collaboration.
  • Maintain and troubleshoot office network hardware (routers, switches, firewalls, Wi-Fi).
  • Manage VPN access and network configurations for secure remote connectivity.
  • Lead the development, implementation, and enforcement of cybersecurity policies.
  • Monitor systems for vulnerabilities, manage endpoint protection, and respond to incidents.
  • Conduct regular audits and ensure compliance with data protection regulations.
  • Develop and maintain user guides, knowledge base articles, and quick reference materials.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service