Job Code: 326/001/182
Industry: Technology / Digital Transformation
Job Brief:The Head of IT will lead the company’s IT strategy, AI-driven automation, and CRM implementation efforts while overseeing all core IT operations. This role combines strategic leadership with hands-on execution, focusing on AI workflow design, CRM deployment (preferably Zoho), cross-department automation, and digital transformation. The position requires strong communication skills, project management capability, and the ability to collaborate across multiple departments to drive operational efficiency.
Job Responsibilities:IT Administration & Infrastructure- Manage all IT systems, hardware, software, networks, and cloud environments.
- Ensure security, uptime, backups, access controls, and compliance with IT standards.
- Implement IT policies, procedures, and best practices across the organization.
- Oversee IT support, troubleshooting, incident response, and vendor coordination.
AI, Automation & Process Innovation- Identify inefficiencies and design AI-driven workflow improvements.
- Build automated workflows using AI LLMs, RAG pipelines, and low-code automation tools.
- Implement AI for document processing, communication automation, and task routing.
- Collaborate with business teams to scale processes through automation.
CRM Implementation & Optimization (Zoho Preferred)- Lead full CRM lifecycle: planning, customization, automation, and optimization.
- Build workflows, blueprints, dashboards, and user journeys.
- Manage integrations between CRM and other business tools.
- Train teams and ensure CRM adoption and best practices.
Cross-Functional Leadership & Project Management- Partner with IT, Operations, Sales, Finance, and senior leaders.
- Translate business needs into technical requirements for AI, CRM, and IT system improvements.
- Lead multiple projects with defined timelines and deliverables.
- Provide technical leadership to internal and outsourced teams.
Security, Compliance & Risk Management- Ensure compliance with security and privacy regulations across all systems.
- Conduct security audits, risk assessments, and disaster recovery simulations.
- Implement best practices for cybersecurity and data protection.