Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of communication methods, principles, and concepts that support the network infrastructure.
Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
Knowledge of organization's Local and Wide Area Network connections.
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
Knowledge of local area and wide area networking principles and concepts including bandwidth management.
Knowledge of measures or indicators of system performance and availability.
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of remote access technology concepts.
Knowledge of server administration and systems engineering theories, concepts, and methods.
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
Knowledge of Virtual Private Network (VPN) security.
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Knowledge of network tools (e.g., ping, traceroute, nslookup)
Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
Knowledge of web filtering technologies.
Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA).
Knowledge of Wi-Fi.
Knowledge of Voice over IP (VoIP).
Knowledge of the common attack vectors on the network layer.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of symmetric key rotation techniques and concepts.
Knowledge of Personally Identifiable Information (PII) data security standards.
Knowledge of Payment Card Industry (PCI) data security standards.
Knowledge of Personal Health Information (PHI) data security standards.
Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
Knowledge of an organization's information classification program and procedures for information compromise.
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of controls related to the use, processing, storage, and transmission of data.
Skill in analyzing network traffic capacity and performance characteristics.
Skill in establishing a routing schema.
Skill in implementing, maintaining, and improving established network security practices.
Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.
Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).
Skill in securing network communications.
Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).
Skill in implementing and testing network infrastructure contingency and recovery plans.
Skill in applying various subnet techniques (e.g., CIDR)
Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).
Ability to operate network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
Ability to operate common network tools (e.g., ping, traceroute, nslookup).
Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
Ability to operate the organization's LAN/WAN pathways.
Ability to monitor measures or indicators of system performance and availability.
Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
Ability to monitor traffic flows across the network.
Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).
Develop and implement network backup and recovery procedures.
Diagnose network connectivity problem.
Implement new system design procedures, test procedures, and quality standards.
Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).
Install or replace network hubs, routers, and switches.
Integrate new systems into existing network architecture.
Monitor network capacity and performance.
Patch network vulnerabilities to ensure that information is safeguarded against outside parties.
Provide feedback on network requirements, including network architecture and infrastructure.
Test and maintain network infrastructure including software and hardware devices.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.