Network Operations Specialist

Plans, implements, and operates network services/systems, to include hardware and virtual environments.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Knowledge of cybersecurity and privacy principles.
  • Knowledge of cyber threats and vulnerabilities.
  • Knowledge of specific operational impacts of cybersecurity lapses.
  • Knowledge of communication methods, principles, and concepts that support the network infrastructure.
  • Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
  • Knowledge of organization's Local and Wide Area Network connections.
  • Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
  • Knowledge of local area and wide area networking principles and concepts including bandwidth management.
  • Knowledge of measures or indicators of system performance and availability.
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of remote access technology concepts.
  • Knowledge of server administration and systems engineering theories, concepts, and methods.
  • Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
  • Knowledge of Virtual Private Network (VPN) security.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of network tools (e.g., ping, traceroute, nslookup)
  • Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
  • Knowledge of web filtering technologies.
  • Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
  • Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA).
  • Knowledge of Wi-Fi.
  • Knowledge of Voice over IP (VoIP).
  • Knowledge of the common attack vectors on the network layer.
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
  • Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of symmetric key rotation techniques and concepts.
  • Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
  • Knowledge of Personally Identifiable Information (PII) data security standards.
  • Knowledge of Payment Card Industry (PCI) data security standards.
  • Knowledge of Personal Health Information (PHI) data security standards.
  • Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
  • Knowledge of an organization's information classification program and procedures for information compromise.
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • Knowledge of controls related to the use, processing, storage, and transmission of data.
  • Skill in analyzing network traffic capacity and performance characteristics.
  • Skill in establishing a routing schema.
  • Skill in implementing, maintaining, and improving established network security practices.
  • Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.
  • Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).
  • Skill in securing network communications.
  • Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
  • Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).
  • Skill in implementing and testing network infrastructure contingency and recovery plans.
  • Skill in applying various subnet techniques (e.g., CIDR)
  • Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).
  • Ability to operate network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
  • Ability to operate common network tools (e.g., ping, traceroute, nslookup).
  • Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
  • Ability to operate the organization's LAN/WAN pathways.
  • Ability to monitor measures or indicators of system performance and availability.
  • Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
  • Ability to monitor traffic flows across the network.
  • Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
  • Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).
  • Develop and implement network backup and recovery procedures.
  • Diagnose network connectivity problem.
  • Implement new system design procedures, test procedures, and quality standards.
  • Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).
  • Install or replace network hubs, routers, and switches.
  • Integrate new systems into existing network architecture.
  • Monitor network capacity and performance.
  • Patch network vulnerabilities to ensure that information is safeguarded against outside parties.
  • Provide feedback on network requirements, including network architecture and infrastructure.
  • Test and maintain network infrastructure including software and hardware devices.