How do they match: Network and Computer Systems Administrators

  • Management Information Systems Manager
  • Information Technology Manager
  • Information Technology Administrator
  • Information Technology Director
  • Information Technology Specialist
  • Information Technology Systems Administrator
  • Information Technology Technical Support Specialist
  • Information Analyst
  • Information Systems Manager
  • Information Systems Administrator
  • Information Systems Coordinator
  • Information Systems Operator
  • IS Manager
  • IT Manager
  • MIS Manager
  • Network Manager
  • Network Support Manager
  • Provider Network Manager
  • Service Delivery Manager
  • Software Manager

  • Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software.

  • Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
  • Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.

  • Collaborate with others to resolve information technology issues.
  • Conduct research to gain information about products or processes.
  • Create electronic data backup to prevent loss of information.
  • Develop computer or information security policies or procedures.
  • Identify information technology project resource requirements.
  • Implement security measures for computer or information systems.
  • Recommend changes to improve computer or information systems.
  • Update knowledge about emerging industry or technology trends.