- Monitor and analyze system performance, such as network traffic, security, and capacity.
Occupations with related tasks Save Table: XLSX CSV
- Conduct network and security system audits, using established criteria.
- Identify security system weaknesses, using penetration tests.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Configure information systems to incorporate principles of least functionality and least access.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop presentations on threat intelligence.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Conduct network and security system audits, using established criteria.
- Identify security system weaknesses, using penetration tests.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
- Perform data backups and disaster recovery operations.
- Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
- Configure, monitor, and maintain email applications or virus protection software.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Analyze equipment performance records to determine the need for repair or replacement.
- Confer with network users about solutions to existing system problems.
- Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Design, configure, and test computer hardware, networking software and operating system software.
- Perform routine network startup and shutdown procedures, and maintain control records.
- Load computer tapes and disks, and install software and printer paper or forms.
- Train people in computer system use.
- Maintain logs related to network functions, as well as maintenance and repair records.
- Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
- Coordinate with vendors and with company personnel to facilitate purchases.
- Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system.
- Maintain an inventory of parts for emergency repairs.
- Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Analyze and report computer network security breaches or attempted breaches.
- Analyze network data to determine network usage, disk space availability, or server function.
- Back up network data.
- Configure security settings or access permissions for groups or individuals.
- Identify the causes of networking problems, using diagnostic testing software and equipment.
- Document network support activities.
- Configure wide area network (WAN) or local area network (LAN) routers or related equipment.
- Install network software, including security or firewall software.
- Troubleshoot network or connectivity problems for users or user groups.
- Provide telephone support related to networking or connectivity issues.
- Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
- Perform routine maintenance or standard repairs to networking components or equipment.
- Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.
- Install new hardware or software systems or components, ensuring integration with existing network systems.
- Test computer software or hardware, using standard diagnostic testing equipment and procedures.
- Install or repair network cables, including fiber optic cables.
- Monitor industry Web sites or publications for information about patches, releases, viruses, or potential problem identification.
- Create or update technical documentation for network installations or changes to existing installations.
- Train users in procedures related to network applications software or related systems.
- Test repaired items to ensure proper operation.
- Install and configure wireless networking equipment.
- Maintain logs of network activity.
- Document help desk requests and resolutions.
- Research hardware or software products to meet technical networking or security needs.
- Create or revise user instructions, procedures, or manuals.
- Run monthly network reports.
- Analyze and report computer network security breaches or attempted breaches.
- Analyze network data to determine network usage, disk space availability, or server function.
- Monitor and analyze network performance and reports on data input or output to detect problems, identify inefficient use of computer resources, or perform capacity planning.
- Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.
- Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
- Develop disaster recovery plans.
- Coordinate network or design activities with designers of associated networks.
- Develop conceptual, logical, or physical network designs.
- Develop and implement solutions for network problems.
- Determine specific network hardware or software requirements, such as platforms, interfaces, bandwidths, or routine schemas.
- Communicate with system users to ensure accounts are set up properly or to diagnose and solve operational problems.
- Visit vendors, attend conferences or training sessions, or study technical journals to keep up with changes in technology.
- Evaluate network designs to determine whether customer requirements are met efficiently and effectively.
- Participate in network technology upgrade or expansion projects, including installation of hardware and software and integration testing.
- Adjust network sizes to meet volume or capacity demands.
- Prepare detailed network specifications, including diagrams, charts, equipment configurations, or recommended technologies.
- Develop network-related documentation.
- Estimate time and materials needed to complete projects.
- Supervise engineers or other staff in the design or implementation of network solutions.
- Coordinate network operations, maintenance, repairs, or upgrades.
- Research and test new or modified hardware or software products to determine performance and interoperability.
- Communicate with customers, sales staff, or marketing staff to determine customer needs.
- Prepare design presentations and proposals for staff or customers.
- Design, build, or operate equipment configuration prototypes, including network hardware, software, servers, or server operation systems.
- Prepare or monitor project schedules, budgets, or cost control systems.
- Develop plans or budgets for network equipment replacement.
- Coordinate installation of new equipment.
- Explain design specifications to integration or test engineers.
- Develop or maintain project reporting systems.
- Use network computer-aided design (CAD) software packages to optimize network designs.
- Maintain or coordinate the maintenance of network peripherals, such as printers.
- Develop and write procedures for installation, use, or troubleshooting of communications hardware or software.
- Communicate with vendors to gather information about products, alert them to future needs, resolve problems, or address system maintenance issues.
- Maintain networks by performing activities such as file addition, deletion, or backup.
- Design, organize, and deliver product awareness, skills transfer, or product education sessions for staff or suppliers.
- Monitor and analyze network performance and reports on data input or output to detect problems, identify inefficient use of computer resources, or perform capacity planning.
- Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Adhere to legal policies and procedures related to handling digital media.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Create system images or capture network settings from information technology environments to preserve as evidence.
- Develop plans for investigating alleged computer crimes, violations, or suspicious activity.
- Develop policies or requirements for data collection, processing, or reporting.
- Duplicate digital evidence to use for data recovery and analysis procedures.
- Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
- Maintain cyber defense software or hardware to support responses to cyber incidents.
- Maintain knowledge of laws, regulations, policies or other issuances pertaining to digital forensics or information privacy.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Preserve and maintain digital forensic evidence for analysis.
- Recommend cyber defense software or hardware to support responses to cyber incidents.
- Recover data or decrypt seized data.
- Write and execute scripts to automate tasks, such as parsing large data files.
- Write cyber defense recommendations, reports, or white papers using research or experience.
- Write reports, sign affidavits, or give depositions for legal proceedings.
- Write technical summaries to report findings.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Adhere to legal policies and procedures related to handling digital media.
- Perform security analyses of developed or packaged software components.
- Monitor system operation to detect potential problems.
- Verify stability, interoperability, portability, security, or scalability of system architecture.
- Develop system engineering, software engineering, system integration, or distributed system architectures.
- Collaborate with engineers or software developers to select appropriate design solutions or ensure the compatibility of system components.
- Identify system data, hardware, or software components required to meet user needs.
- Communicate with staff or clients to understand specific system requirements.
- Research, test, or verify proper functioning of software patches and fixes.
- Provide advice on project costs, design concepts, or design changes.
- Provide technical guidance or support for the development or troubleshooting of systems.
- Document design specifications, installation instructions, and other system-related information.
- Communicate project information through presentations, technical reports, or white papers.
- Define and analyze objectives, scope, issues, or organizational impact of information systems.
- Design and conduct hardware or software tests.
- Evaluate current or emerging technologies to consider factors such as cost, portability, compatibility, or usability.
- Provide customers or installation teams guidelines for implementing secure systems.
- Establish functional or system standards to address operational requirements, quality requirements, and design constraints.
- Investigate system component suitability for specified purposes, and make recommendations regarding component use.
- Complete models and simulations, using manual or automated tools, to analyze or predict system performance under different operating conditions.
- Develop or approve project plans, schedules, or budgets.
- Develop efficient and effective system controllers.
- Evaluate existing systems to determine effectiveness, and suggest changes to meet organizational requirements.
- Configure servers to meet functional specifications.
- Direct the analysis, development, and operation of complete computer systems.
- Develop application-specific software.
- Perform ongoing hardware and software maintenance operations, including installing or upgrading hardware or software.
- Direct the installation of operating systems, network or application software, or computer or network hardware.
- Train system users in system operation or maintenance.
- Perform security analyses of developed or packaged software components.
- Monitor system operation to detect potential problems.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Address the relationships of quantities, magnitudes, and forms through the use of numbers and symbols.
- Disseminate research by writing reports, publishing papers, or presenting at professional conferences.
- Maintain knowledge in the field by reading professional journals, talking with other mathematicians, and attending professional conferences.
- Apply mathematical theories and techniques to the solution of practical problems in business, engineering, the sciences, or other fields.
- Develop mathematical or statistical models of phenomena to be used for analysis or for computational simulation.
- Perform computations and apply methods of numerical analysis to data.
- Assemble sets of assumptions, and explore the consequences of each set.
- Develop new principles and new relationships between existing mathematical principles to advance mathematical science.
- Develop computational methods for solving problems that occur in areas of science and engineering or that come from applications in business or industry.
- Conduct research to extend mathematical knowledge in traditional areas, such as algebra, geometry, probability, and logic.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.
- Analyze problems to develop solutions involving computer hardware and software.
- Apply theoretical expertise and innovation to create or apply new technology, such as adapting principles for applying computers to new uses.
- Assign or schedule tasks to meet work priorities and goals.
- Meet with managers, vendors, and others to solicit cooperation and resolve problems.
- Design computers and the software that runs them.
- Conduct logical analyses of business, scientific, engineering, and other technical problems, formulating mathematical models of problems for solution by computers.
- Evaluate project plans and proposals to assess feasibility issues.
- Participate in multidisciplinary projects in areas such as virtual reality, human-computer interaction, or robotics.
- Consult with users, management, vendors, and technicians to determine computing needs and system requirements.
- Develop and interpret organizational goals, policies, and procedures.
- Develop performance standards, and evaluate work in light of established standards.
- Direct daily operations of departments, coordinating project activities with other departments.
- Participate in staffing decisions and direct training of subordinates.
- Approve, prepare, monitor, and adjust operational budgets.
- Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.
- Assess blockchain threats, such as untested code and unprotected keys.
- Automate the deployment of software updates over geographically distributed network nodes.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Design and develop blockchain technologies for industries such as finance and music.
- Design and implement dashboard and data visualizations to meet customer reporting needs.
- Design and implement data repositories to integrate data.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Develop a maintainable code base using object-oriented design principles, practices, or patterns.
- Discuss and plan systems with solution architects, system engineers, or cybersecurity experts to meet customer requirements.
- Discuss data needs with engineers, product managers, or data scientists to identify blockchain requirements.
- Evaluate blockchain processes or risks based on security assessments or control matrix reviews.
- Evaluate new blockchain technologies and vendor products.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Update client and server applications responsible for integration and business logic.
- Assess blockchain threats, such as untested code and unprotected keys.
- Identify security system weaknesses, using penetration tests.
- Assess the quality of security controls, using performance indicators.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Coordinate vulnerability assessments or analysis of information security systems.
- Develop information security standards and best practices.
- Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
- Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
- Develop response and recovery strategies for security breaches.
- Identify or implement solutions to information security problems.
- Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
- Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
- Provide technical support to computer users for installation and use of security products.
- Recommend information security enhancements to management.
- Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
- Scan networks, using vulnerability assessment tools to identify vulnerabilities.
- Train staff on, and oversee the use of, information security standards, policies, and best practices.
- Troubleshoot security and network problems.
- Write reports regarding investigations of information security breaches or network evaluations.
- Identify security system weaknesses, using penetration tests.
- Perform risk assessments to develop response strategies.
- Manage project execution to ensure adherence to budget, schedule, and scope.
- Confer with project personnel to identify and resolve problems.
- Assess current or future customer needs and priorities by communicating directly with customers, conducting surveys, or other methods.
- Initiate, review, or approve modifications to project plans.
- Schedule and facilitate meetings related to information technology projects.
- Direct or coordinate activities of project personnel.
- Develop implementation plans that include analyses such as cost-benefit or return on investment (ROI).
- Identify need for initial or supplemental project resources.
- Develop or update project plans for information technology projects including information such as project objectives, technologies, systems, information specifications, schedules, funding, and staffing.
- Prepare project status reports by collecting, analyzing, and summarizing information and trends.
- Identify, review, or select vendors or consultants to meet project needs.
- Develop and manage annual budgets for information technology projects.
- Establish and execute a project communication plan.
- Develop and manage work breakdown structure (WBS) of information technology projects.
- Monitor the performance of project team members, providing and documenting performance feedback.
- Coordinate recruitment or selection of project personnel.
- Assign duties, responsibilities, and spans of authority to project personnel.
- Negotiate with project stakeholders or suppliers to obtain resources or materials.
- Monitor or track project milestones and deliverables.
- Submit project deliverables, ensuring adherence to quality standards.
- Perform risk assessments to develop response strategies.