We are committed to providing reasonable accommodations for individuals with disabilities in our job application process. If you need assistance or an accommodation during the application or recruitment process due to a disability, you may contact us at [email protected]. We will treat all requests for accommodations discreetly.
*Note: There is no Visa sponsorship being offered for this position.
Kimball Electronics does not accept agency resumes. Please do not forward resumes to any recruiting alias or employee. Kimball Electronics is not responsible for any fees related to unsolicited resumes.
The IT System Support Specialist position is an IT Operations focused role within Kimball Electronics Shared Services(KESS) that reports to the Sr Manager of IT Operations. This is a global position that will be responsible for and correcting or escalating automated alerts and reported IT/Cybersecurity incidents/Requests while also providing identity and access management support, and day to day operations initiatives to Shared Services and Global Business Unit IT staff. We value our environment of mutual trust, personal integrity, cooperation, sense of family and good humor. We cultivate a style of empowerment, individual initiative and teamwork. We believe that candidates will enjoy our flexibility in maintaining a strong work-life balance.
This position is remote, and employee can be located in the US or Reynosa, Mexico. We are looking for someone to work daytime US Hours based on Eastern Time Zone
To be successful, the candidate must possess:
- a positive attitude, excellent communication skills, ability to handle multiple priorities and effectively transform business needs into technical solutions.
- a degree from an accredited university or college or have at least 2 years overall work experience in a Desktop or Cybersecurity role
The preferred candidate will have experience or qualifications with the following:
- Windows, Active Directory, Azure Active Directory and LDAP
- Experience configuring Multi-factor Authentication and Single-sign-on
- Microsoft Entra and Microsoft Identity Management and associated components
- Information Security, Network Systems, and/or Unix/Linux experience considered a plus.
- Administrative and troubleshooting skills, knowledgeable about architecture, engineering and design principles.
- Special consideration given to candidates possessing information security certifications and project management experience.
Key Performance Objectives:
Short Term (0-6 months):
- Learn KEI Guiding Principles, philosophies, and cultural attributes.
- Develop technical relationships with key IT contacts.
- Build and maintain business relationships with Business Unit contacts.
- Learn key troubleshooting and procedures from KESC/Cybersecurity personnel
- Understand our KEI incident response plans and processes to address potential threats.
- Learn KEI standards, procedures, and processes to uncover, resist and recover from security incidents in alignment with enterprise ISMS.
- Develop skills to document all reported and monitored issues into our knowledge base systems.
- Training involving Level 2 operations, monitoring, and dispatch support for enterprise computing infrastructure and network.
- Develop skills for access management requests and user onboarding/offboarding administration
- Learn and Develop skills to provide Triaging to Cybersecurity related events and incidents
- Assist SOC team in Triage remediations efforts and provides guidance.
- Learn remediation strategies to address vulnerabilities and reduce attack surface and overall cyber risk.
- Supports compliance and risk management activities according to our ISMS.
- Participate in incident response support, Including communication and assistance alongside escalated KEI IT Support.
- Participates in IT Projects and Meetings
Mid to Long Term (6 + months):
- Provide Level 2 operations, monitoring & dispatch support for enterprise computing infrastructure and network.
- Document all reported or monitored problems and resolutions in knowledge management system
- Escalate problems to other Level 2 or Level 3 IT support functions when unable to resolve within KESC
- Monitor, accept and transfer open work requests or support issues between the other regional IT teams
- Triage SOC related events, incidents and provide support to SOC analyst
- Follow up with Level 1 support on status of problem and ensure satisfaction with resolution
- Recognize issue trends and facilitate corrective and preventative analysis
- Observes network and security events and uses discretionary authority for cybersecurity incident event reporting and escalation.
- Processes emergency inactivation of User ID accounts in support of employee separation notifications.
- Collects intrusion artifacts (e.g., source code, malware, trojans) and uses discovered data to assist with mitigation of potential cyber incidents within the enterprise.
- Assists with coordinating cyber incident response functions.
- Monitors external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber threat conditions and communicating which security issues may have an impact on the enterprise.
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
- Write and publish initial incident reports and escalate reports to higher constituencies.
- Fulfills access management requests and administration, including onboarding access support, position transfers, offboarding
- Provides technical support for access reviews of individuals and IT resources
- Assist in after hours on call support
- Participate in Special IT projects and meetings
Don’t meet every single requirement? Studies have shown underrepresented groups are less likely to apply to jobs unless they meet every single qualification. At Kimball Electronics we are dedicated to building a diverse and inclusive work environment. If you think you might be a good fit for a role but don't necessarily meet every requirement, we encourage you to apply. You may be the right candidate for this role or other roles!
We’re proud to be an equal opportunity employer and consider qualified applicants without regard to race, color, religion, sex, national origin, ancestry, age, genetic information, sexual orientation, gender identity, marital or family status, veteran status, medical condition or disability or any other characteristic protected by applicable federal, state, or local law.
We will consider for employment qualified candidates with arrest and conviction records, consistent with applicable law (including, for example, the San Francisco Fair Chance Ordinance for roles based in San Francisco).
The typical pay range for this role is: $50,000-$60,000
the actual wages offered will vary based on multiple factors, including experience, education, geography, and other relevant factors.
Top Skills
Similar Jobs
What you need to know about the Austin Tech Scene
Key Facts About Austin Tech
- Number of Tech Workers: 180,500; 13.7% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Dell, IBM, AMD, Apple, Alphabet
- Key Industries: Artificial intelligence, hardware, cloud computing, software, healthtech
- Funding Landscape: $4.5 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Live Oak Ventures, Austin Ventures, Hinge Capital, Gigafund, KdT Ventures, Next Coast Ventures, Silverton Partners
- Research Centers and Universities: University of Texas, Southwestern University, Texas State University, Center for Complex Quantum Systems, Oden Institute for Computational Engineering and Sciences, Texas Advanced Computing Center



