1. Ensure overall security and integrity of their managed OU hierarchy
- Use the OU admin account only for actions that require the privilege level of this account
- Monitoring changes to OU hierarchy to ensure unauthorized changes do not occur
- Delegation of authority to others for appropriate object administration in their OU hierarchy
2. Account management
- Creation/deletion/management of objects, i.e. local user accounts, groups, workstations, servers, printers, etc. in their OU hierarchy
- Regularly perform housekeeping duties to keep their OU hierarchy clear of stale, unused, expired, and other no longer needed objects
- Process requests for access control authorized by data owner
- Process requests for group drive mappings via login script
- Create new computer accounts and join to directory services
3. The OU administrator will designate which administrators have "account operator" access to the Windows user accounts for users in their department.
- These account operators will have privileges that let them make changes to a subset of attributes for the accounts in their OU
- This subset of attributes includes Windows-centric information like home directory location, profile location, terminal server settings and other kinds of user data that isn't replicated from the root of the LBL domain
4. Group Policy Object (GPO) creation, troubleshooting, and management
5. Publishing resource objects from their OU hierarchy in the Active Directory as applicable
6. Manage Group Policy Object (GPO) links within their OU hierarchy
7. Coordinate activities of Member Server owners
- Work with server and/or data owners to set up permissions
8. Policy Compliance
- Comply with LBL AD policies and standards as defined on the AD Web Site
- Apply LBL standard naming conventions to objects in their OU hierarchy
9. Contact information.
- Each top-level OU must contain contact information for the department to facilitate contacting OU administrators
- When OU manager changes, notify the Enterprise Administrator
10. Verify new software deployments and GPO policies work by testing them in a test domain as appropriate.
11. Communication and coordination
- Work collectively with the domain admins and with other OU administrators
- Keep informed about domain-wide changes (e.g. attend periodic meetings of the OU administrators or participate in mail lists)
- Provide the following to the domain admins, when suspecting a desktop related problem stems from a change to the Active Directory or DC configuration
->event description
->logon name of affected user
->name of affected computer
->time of event
->relevant warnings and errors in event logs
->relevant warnings or errors displayed on screen
Job Types: Full-time, Permanent
Pay: ?262,547.09 - ?1,133,633.07 per year
Benefits:
Health insurance
Provident Fund
Schedule:
Monday to Friday
Supplemental Pay:
Performance bonus
Shift allowance
Experience:
Active Directory: 5 years (Required)
Work Location: In person
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.