Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of measures or indicators of system performance and availability.
Knowledge of systems administration concepts.
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, digital scanners, electronic organizers, hard drives, memory cards, modems, network components, networked appliances, networked home control devices, printers, removable storage devices, telephones, copiers, facsimile machines, etc.).
Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).
Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
Knowledge of industry best practices for service desk.
Knowledge of organizational security policies.
Knowledge of remote access processes, tools, and capabilities related to customer support.
Knowledge of Personally Identifiable Information (PII) data security standards.
Knowledge of Payment Card Industry (PCI) data security standards.
Knowledge of Personal Health Information (PHI) data security standards.
Knowledge of an organization's information classification program and procedures for information compromise.
Knowledge of the operations and processes for incident, problem, and event management.
Knowledge of IT system operation, maintenance, and security needed to keep equipment functioning properly.
Knowledge of the basic operation of computers.
Knowledge of procedures used for documenting and querying reported incidents, problems, and events.
Knowledge of successful capabilities to identify the solutions to less common and more complex system problems.
Skill in identifying possible causes of degradation of system performance or availability and initiating actions needed to mitigate this degradation.
Skill in using the appropriate tools for repairing software, hardware, and peripheral equipment of a system.
Skill in conducting research for troubleshooting novel client-level problems.
Skill in configuring and validating network workstations and peripherals in accordance with approved standards and/or specifications.
Skill to design incident response for cloud service models.
Ability to accurately define incidents, problems, and events in the trouble ticketing system.
Ability to develop, update, and/or maintain standard operating procedures (SOPs).
Ability to design capabilities to find solutions to less common and more complex system problems.
Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).
Troubleshoot system hardware and software.
Analyze incident data for emerging trends.
Develop and deliver technical training to educate others or meet customer needs.
Maintain incident tracking and solution database.
Diagnose and resolve customer reported system incidents, problems, and events.
Make recommendations based on trend analysis for enhancements to software and hardware solutions to enhance customer experience.
Install and configure hardware, software, and peripheral equipment for system users in accordance with organizational standards.
Administer accounts, network rights, and access to systems and equipment.
Perform asset management/inventory of information technology (IT) resources.
Monitor and report client-level computer system performance.
Develop a trend analysis and impact report.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.