Implementation of Endpoint security Best Practices as per ISO27001, CIS security standards, SOC 2 using tools such as Microsoft Security or equivalent Maintenance of the Company’s IT laptops/ smart devices, printers, including intranet, internet, ERP system, servers, workstations, backup and network security on Microsoft, Android and Apple Installation, configuration and maintenance of software and hardware in laptops, workstations, servers IT Patch Management and Vulnerability Management Development of standard operating procedures, including Information and CyberSecurity implementation in accordance with the Company’s business systems and processes Manage Domain Controller, Azure Active Directory, Services, Group Policy in all company assets physical/virtualManage Identity and Access Management (IAM) policies, Group integrations, DNS settings and configuration, Router Configuration and Switches, IP Setting Configuration, backup procedure, TCP IP V4 and V6 and, POE Switches and Manage LAN Connection Manage and maintain Azure AD based authentication and Role Based authorization for the company applications – including Microsoft Office Enterprise, Atlassian products (JIRA, Confluence), Support tools like Freshservice etc. Creation of user manuals wherever necessary Create periodic and customized reports and queries Partner with Tech Partners to ensure IT security compliance of Tech. Partner staff using Tech. Partner devices