Network Systems and Security Technician

Hybrid-based occupation
Onet code: 15-1232.00

1

Years

47

Skills

120h

Related instruction

1000h

On-the-job training
Classroom Instruction Topics
  • Demonstrate safety procedures, proficiency, and skills concerning technology in work environment
  • Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes
  • Identify potential abuse and unethical uses
  • Describe possible threats for laptops, tablets, computers, and networks
  • Discuss consequences of unethical uses of technology [such as piracy, downloading, license infringement, and inappropriate use of software, hardware, and devices] in the workplace
  • Explain importance of data security, confidentiality, and integrity
  • Build cabling [passthrough, crossover, and TAP]
  • Design a basic network topology
  • Compare and contrast common operating systems and common file systems
  • Implement Active X and Java Security
  • Set up shared documents/folders and back up data using a utility
  • Explain network design elements and components
  • Implement common protocols and services
  • Troubleshoot security issues related to wireless networking
  • Summarize types of attacks. threats, and vulnerabilities
  • Compare and contrast the function and purpose of authentication services
  • Install and configure security controls when performing account management
  • Use appropriate cryptographic methods, Public Key Infrastructure (PKI), certificate management, and associated components
  • Orientation
  • Safety Meetings
  • Fundamentals of Computing
On-the-job Training
  • Security Policies & Protocols
    • Assists in developing security policies and protocols
    • Locates organizational policies intended to maintain security and minimize risk and explains their use
    • Explains company or organization's policies regarding the storage, use and transfer of sensitive data, including intellectual property and personally identifiable information. Identifies data life cycle, data storage facilities, technologies and describe
    • Assists in enforcing company compliance with network security policies and protocols
    • Ensures that password characteristics are explained and enforced and that updates are required and enforced based on appropriate time intervals
    • Assists employees in the use of technologies that restrict or allow for remote access to the organization's information technology network
    • Articulates the business need or mission of the organization as it pertains to the use of IT systems and the storage of sensitive data
  • Technical Support
    • Provides technical support to users or customers
    • Manages inventory of IT resources
    • Installs and configures hardware, software and peripheral equipment for system users
    • Tests computer system performance
    • Troubleshoots system hardware and software
    • Diagnoses and resolves customer-reported system incidents
    • Administers equipment
  • Network Support
    • Diagnoses network connectivity problems
    • Repairs network connectivity problems
    • Tests and maintains network infrastructure including software and hardware devices
    • Implements security measures for users in system and ensures that system designs incorporate security configuration guidelines
    • Assists in network backup and recovery procedures
    • Integrates new systems into existing network architecture
    • Establishes adequate access controls based on principles of least privilege and need-to-know
  • Server Support
    • Conducts functional and connectivity testing to ensure continuing operability
    • Conducts periodic server maintenance including cleaning (physically and electronically), disk checks, system configuration and monitoring, data downloads, backups and testing
    • Manages accounts, network rights and access to systems and equipment
    • Supports network components specific to the server platform (i.e. NIC card, or network plane on blade chassis, or other components based on work assignment).
    • Diagnoses faulty system/server hardware; seeks appropriate support or assistance to perform server repairs
    • Resolves hardware/software interface and interoperability problems
    • Checks system hardware availability, functionality, integrity and efficiency
    • Documents compliance with or changes to system administration standard operating procedures
    • Monitors and maintains server configuration
    • Verifies data redundancy and system recovery procedures
    • Assists in the coordination or installation of new or modified hardware, operating systems and other baseline software
    • Provides ongoing optimization and problem-solving support
  • Configuration Management
    • Installs and maintains cyber security detection, monitoring and threat management software
    • Coordinates with network administrators to administer the updating of rules and signatures for intrusion/detection protection systems, anti-virus and network black and white list
    • Manages IP addresses based on current threat environment
  • Risk and Vulnerabilities
    • Ensures that data back up and restoration systems are functional and consistent with company's document retention policy and business continuity needs
    • Applies security policies to meet security objectives of the system
    • Documents systems security operations and maintenance activities
  • Threat Detection
    • Identifies organizational trends with regard to the security posture of systems; identifies unusual patterns or activities
    • Assists in researching cost-effective security controls to mitigate risks
    • Documents and escalates incidents that may cause immediate or long-term impact to the environment
  • Defense to Intrusion and Attack
    • Performs virus scanning on digital media
    • Tracks and documents computer network defense incidents from initial detection through final resolution.
  • Customer Engagement
    • Perform basic interpersonal skills needed in a help desk environment.
    • Perform interpersonal skills needed in a help desk environment including conflict resolution.
    • Participate in efforts to provide engineering support or leadership.
calendar.svg
Get on our calendar
Not sure if WorkHands is right for you? Chat with our team today
sendEmail.svg
Send us an email
We'll get back to you shortly