IT/Admin Support

Contact for pricing

About this service

Summary

Anything IT/Admin and some security related tasks/projects I am ready to hit the ground running!

What's included

  • IT Onboarding Manual

    Description: A comprehensive guide designed for new employees, detailing the IT processes, tools, and protocols within the organization. This manual would cover everything from setting up email accounts to accessing shared drives and using company-specific software. Purpose: To streamline the onboarding process for new hires, ensuring they have all the necessary IT resources and knowledge to start their roles effectively. Components: Step-by-step setup guides, FAQs, troubleshooting tips, contact information for IT support, and a glossary of IT terms used within the company.

  • Software Training

    Description: A set of training materials or tutorials designed to help employees understand and use company-specific or commonly used software applications more effectively. Purpose: To reduce the number of user-generated errors, enhance productivity, and decrease the volume of basic software-related queries to the IT support team. Components: Step-by-step guides, video tutorials, best practices, quizzes to test understanding, and feedback forms.

  • Incident response Plan Eval

    Description: A thorough review of the organization's incident response plan, which outlines the steps to be taken in the event of a cybersecurity incident. This evaluation ensures that the plan is up-to-date, comprehensive, and effective. Purpose: To ensure that the organization is prepared to respond quickly and effectively to cybersecurity incidents, minimizing potential damage and recovery time. Components: Overview of the current incident response plan, evaluation criteria, identified gaps or areas of improvement, recommendations for updates, and a mock incident exercise to test the plan's effectiveness.

  • User Access & Permissions

    Description: An analysis of user accounts, roles, and permissions within the organization's systems and applications. This review ensures that only authorized individuals have access to specific data in your business. Purpose: To prevent unauthorized access and potential data breaches by ensuring that users only have access to the information necessary for their roles. Components: List of all active user accounts, roles and associated permissions, accounts with elevated privileges, dormant accounts, recommendations for revoking unnecessary permissions, and a plan for periodic reviews.


Skills and tools

Technical Support Specialist
Data Analyst
Technical Writer
ChatGPT
Google Drive
G Suite
Microsoft Office 365

Work with me


More services