Views:
36Information Technology Specialist
Employer: | Horizon Credit Union |
Location: | Farmington |
Job Type: | ![]() |
Part-Time Schedule: Afternoons Monday through Friday till close of business
Job Details:
- Paid leave – Part-time employees will receive vacation time accrual starting their second pay period of employment (Equivalent to 40 hours/annually). Accrual begins the first of the month following one month of employment.
- Company Holidays – Part-time employees are eligible for up to 10 paid holidays annually.
- 401(k) retirement plans – New employees eligible for 401K package at the first of the month following one month of employment.
Responsibilities
The IT Specialist will gain hands-on experience in many aspects of Information Technology including: End User support, Networking, Systems Administration, and Security.
The applicant should be able to perform each duty successfully and in a professional manner.
- Provide support to users relating to both hardware and software used by the Credit Union.
- Test, install, configure, maintain, inventory, and update Credit Union owned end user devices (e.g. PC, phone, tablet).
- Test, install, configure, maintain, inventory, and update Credit Union owned network infrastructure (e.g. servers, applications, routers, switches).
- Researches and recommends new hardware, network, and technical products to enhance and improve services.
- Prepares documentation concerning the adaptation of complex hardware, software, and other networking elements used at the Credit Union.
- Perform other duties as assigned.
Qualifications
- Two-year college degree or equivalent experience
- Minimum of one year of related experience
- Strong communication and interpersonal skills
- Experience working in teams and collaborating on projects
- Strong problem solving and analytical skills
- Effective time management
- Technical skills in the following areas: General Troubleshooting, Windows Operating Systems, Microsoft 365/Azure Cloud Services (Preferred), General Networking Technologies, Cybersecurity Principles and Strategies
Published February 13, 2025
Viewed: 36 times
Viewed: 36 times