- Monitor and analyze system performance, such as network traffic, security, and capacity.
Occupations with related tasks Save Table: XLSX CSV
- Conduct network and security system audits, using established criteria.
- Identify security system weaknesses, using penetration tests.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Configure information systems to incorporate principles of least functionality and least access.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop presentations on threat intelligence.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Conduct network and security system audits, using established criteria.
- Identify security system weaknesses, using penetration tests.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
- Perform data backups and disaster recovery operations.
- Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
- Configure, monitor, and maintain email applications or virus protection software.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Analyze equipment performance records to determine the need for repair or replacement.
- Confer with network users about solutions to existing system problems.
- Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Design, configure, and test computer hardware, networking software and operating system software.
- Perform routine network startup and shutdown procedures, and maintain control records.
- Load computer tapes and disks, and install software and printer paper or forms.
- Train people in computer system use.
- Maintain logs related to network functions, as well as maintenance and repair records.
- Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
- Coordinate with vendors and with company personnel to facilitate purchases.
- Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system.
- Maintain an inventory of parts for emergency repairs.
- Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Analyze and report computer network security breaches or attempted breaches.
- Analyze network data to determine network usage, disk space availability, or server function.
- Back up network data.
- Configure security settings or access permissions for groups or individuals.
- Identify the causes of networking problems, using diagnostic testing software and equipment.
- Document network support activities.
- Configure wide area network (WAN) or local area network (LAN) routers or related equipment.
- Install network software, including security or firewall software.
- Troubleshoot network or connectivity problems for users or user groups.
- Provide telephone support related to networking or connectivity issues.
- Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
- Perform routine maintenance or standard repairs to networking components or equipment.
- Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.
- Install new hardware or software systems or components, ensuring integration with existing network systems.
- Test computer software or hardware, using standard diagnostic testing equipment and procedures.
- Install or repair network cables, including fiber optic cables.
- Monitor industry Web sites or publications for information about patches, releases, viruses, or potential problem identification.
- Create or update technical documentation for network installations or changes to existing installations.
- Train users in procedures related to network applications software or related systems.
- Test repaired items to ensure proper operation.
- Install and configure wireless networking equipment.
- Maintain logs of network activity.
- Document help desk requests and resolutions.
- Research hardware or software products to meet technical networking or security needs.
- Create or revise user instructions, procedures, or manuals.
- Run monthly network reports.
- Analyze and report computer network security breaches or attempted breaches.
- Analyze network data to determine network usage, disk space availability, or server function.
- Monitor and analyze network performance and reports on data input or output to detect problems, identify inefficient use of computer resources, or perform capacity planning.
- Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.
- Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
- Develop disaster recovery plans.
- Coordinate network or design activities with designers of associated networks.
- Develop conceptual, logical, or physical network designs.
- Develop and implement solutions for network problems.
- Determine specific network hardware or software requirements, such as platforms, interfaces, bandwidths, or routine schemas.
- Communicate with system users to ensure accounts are set up properly or to diagnose and solve operational problems.
- Visit vendors, attend conferences or training sessions, or study technical journals to keep up with changes in technology.
- Evaluate network designs to determine whether customer requirements are met efficiently and effectively.
- Participate in network technology upgrade or expansion projects, including installation of hardware and software and integration testing.
- Adjust network sizes to meet volume or capacity demands.
- Prepare detailed network specifications, including diagrams, charts, equipment configurations, or recommended technologies.
- Develop network-related documentation.
- Estimate time and materials needed to complete projects.
- Supervise engineers or other staff in the design or implementation of network solutions.
- Coordinate network operations, maintenance, repairs, or upgrades.
- Research and test new or modified hardware or software products to determine performance and interoperability.
- Communicate with customers, sales staff, or marketing staff to determine customer needs.
- Prepare design presentations and proposals for staff or customers.
- Design, build, or operate equipment configuration prototypes, including network hardware, software, servers, or server operation systems.
- Prepare or monitor project schedules, budgets, or cost control systems.
- Develop plans or budgets for network equipment replacement.
- Coordinate installation of new equipment.
- Explain design specifications to integration or test engineers.
- Develop or maintain project reporting systems.
- Use network computer-aided design (CAD) software packages to optimize network designs.
- Maintain or coordinate the maintenance of network peripherals, such as printers.
- Develop and write procedures for installation, use, or troubleshooting of communications hardware or software.
- Communicate with vendors to gather information about products, alert them to future needs, resolve problems, or address system maintenance issues.
- Maintain networks by performing activities such as file addition, deletion, or backup.
- Design, organize, and deliver product awareness, skills transfer, or product education sessions for staff or suppliers.
- Monitor and analyze network performance and reports on data input or output to detect problems, identify inefficient use of computer resources, or perform capacity planning.
- Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Adhere to legal policies and procedures related to handling digital media.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Create system images or capture network settings from information technology environments to preserve as evidence.
- Develop plans for investigating alleged computer crimes, violations, or suspicious activity.
- Develop policies or requirements for data collection, processing, or reporting.
- Duplicate digital evidence to use for data recovery and analysis procedures.
- Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
- Maintain cyber defense software or hardware to support responses to cyber incidents.
- Maintain knowledge of laws, regulations, policies or other issuances pertaining to digital forensics or information privacy.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Preserve and maintain digital forensic evidence for analysis.
- Recommend cyber defense software or hardware to support responses to cyber incidents.
- Recover data or decrypt seized data.
- Write and execute scripts to automate tasks, such as parsing large data files.
- Write cyber defense recommendations, reports, or white papers using research or experience.
- Write reports, sign affidavits, or give depositions for legal proceedings.
- Write technical summaries to report findings.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Adhere to legal policies and procedures related to handling digital media.
- Perform security analyses of developed or packaged software components.
- Monitor system operation to detect potential problems.
- Verify stability, interoperability, portability, security, or scalability of system architecture.
- Develop system engineering, software engineering, system integration, or distributed system architectures.
- Collaborate with engineers or software developers to select appropriate design solutions or ensure the compatibility of system components.
- Identify system data, hardware, or software components required to meet user needs.
- Communicate with staff or clients to understand specific system requirements.
- Research, test, or verify proper functioning of software patches and fixes.
- Provide advice on project costs, design concepts, or design changes.
- Provide technical guidance or support for the development or troubleshooting of systems.
- Document design specifications, installation instructions, and other system-related information.
- Communicate project information through presentations, technical reports, or white papers.
- Define and analyze objectives, scope, issues, or organizational impact of information systems.
- Design and conduct hardware or software tests.
- Evaluate current or emerging technologies to consider factors such as cost, portability, compatibility, or usability.
- Provide customers or installation teams guidelines for implementing secure systems.
- Establish functional or system standards to address operational requirements, quality requirements, and design constraints.
- Investigate system component suitability for specified purposes, and make recommendations regarding component use.
- Complete models and simulations, using manual or automated tools, to analyze or predict system performance under different operating conditions.
- Develop or approve project plans, schedules, or budgets.
- Develop efficient and effective system controllers.
- Evaluate existing systems to determine effectiveness, and suggest changes to meet organizational requirements.
- Configure servers to meet functional specifications.
- Direct the analysis, development, and operation of complete computer systems.
- Develop application-specific software.
- Perform ongoing hardware and software maintenance operations, including installing or upgrading hardware or software.
- Direct the installation of operating systems, network or application software, or computer or network hardware.
- Train system users in system operation or maintenance.
- Perform security analyses of developed or packaged software components.
- Monitor system operation to detect potential problems.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Address the relationships of quantities, magnitudes, and forms through the use of numbers and symbols.
- Disseminate research by writing reports, publishing papers, or presenting at professional conferences.
- Maintain knowledge in the field by reading professional journals, talking with other mathematicians, and attending professional conferences.
- Apply mathematical theories and techniques to the solution of practical problems in business, engineering, the sciences, or other fields.
- Develop mathematical or statistical models of phenomena to be used for analysis or for computational simulation.
- Perform computations and apply methods of numerical analysis to data.
- Assemble sets of assumptions, and explore the consequences of each set.
- Develop new principles and new relationships between existing mathematical principles to advance mathematical science.
- Develop computational methods for solving problems that occur in areas of science and engineering or that come from applications in business or industry.
- Conduct research to extend mathematical knowledge in traditional areas, such as algebra, geometry, probability, and logic.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.
- Analyze problems to develop solutions involving computer hardware and software.
- Apply theoretical expertise and innovation to create or apply new technology, such as adapting principles for applying computers to new uses.
- Assign or schedule tasks to meet work priorities and goals.
- Meet with managers, vendors, and others to solicit cooperation and resolve problems.
- Design computers and the software that runs them.
- Conduct logical analyses of business, scientific, engineering, and other technical problems, formulating mathematical models of problems for solution by computers.
- Evaluate project plans and proposals to assess feasibility issues.
- Participate in multidisciplinary projects in areas such as virtual reality, human-computer interaction, or robotics.
- Consult with users, management, vendors, and technicians to determine computing needs and system requirements.
- Develop and interpret organizational goals, policies, and procedures.
- Develop performance standards, and evaluate work in light of established standards.
- Direct daily operations of departments, coordinating project activities with other departments.
- Participate in staffing decisions and direct training of subordinates.
- Approve, prepare, monitor, and adjust operational budgets.
- Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.
- Assess blockchain threats, such as untested code and unprotected keys.
- Automate the deployment of software updates over geographically distributed network nodes.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Design and develop blockchain technologies for industries such as finance and music.
- Design and implement dashboard and data visualizations to meet customer reporting needs.
- Design and implement data repositories to integrate data.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Develop a maintainable code base using object-oriented design principles, practices, or patterns.
- Discuss and plan systems with solution architects, system engineers, or cybersecurity experts to meet customer requirements.
- Discuss data needs with engineers, product managers, or data scientists to identify blockchain requirements.
- Evaluate blockchain processes or risks based on security assessments or control matrix reviews.
- Evaluate new blockchain technologies and vendor products.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Update client and server applications responsible for integration and business logic.
- Assess blockchain threats, such as untested code and unprotected keys.
- Identify security system weaknesses, using penetration tests.
- Assess the quality of security controls, using performance indicators.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Coordinate vulnerability assessments or analysis of information security systems.
- Develop information security standards and best practices.
- Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
- Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
- Develop response and recovery strategies for security breaches.
- Identify or implement solutions to information security problems.
- Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
- Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
- Provide technical support to computer users for installation and use of security products.
- Recommend information security enhancements to management.
- Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
- Scan networks, using vulnerability assessment tools to identify vulnerabilities.
- Train staff on, and oversee the use of, information security standards, policies, and best practices.
- Troubleshoot security and network problems.
- Write reports regarding investigations of information security breaches or network evaluations.
- Identify security system weaknesses, using penetration tests.
- Perform risk assessments to develop response strategies.
- Manage project execution to ensure adherence to budget, schedule, and scope.
- Confer with project personnel to identify and resolve problems.
- Assess current or future customer needs and priorities by communicating directly with customers, conducting surveys, or other methods.
- Initiate, review, or approve modifications to project plans.
- Schedule and facilitate meetings related to information technology projects.
- Direct or coordinate activities of project personnel.
- Develop implementation plans that include analyses such as cost-benefit or return on investment (ROI).
- Identify need for initial or supplemental project resources.
- Develop or update project plans for information technology projects including information such as project objectives, technologies, systems, information specifications, schedules, funding, and staffing.
- Prepare project status reports by collecting, analyzing, and summarizing information and trends.
- Identify, review, or select vendors or consultants to meet project needs.
- Develop and manage annual budgets for information technology projects.
- Establish and execute a project communication plan.
- Develop and manage work breakdown structure (WBS) of information technology projects.
- Monitor the performance of project team members, providing and documenting performance feedback.
- Coordinate recruitment or selection of project personnel.
- Assign duties, responsibilities, and spans of authority to project personnel.
- Negotiate with project stakeholders or suppliers to obtain resources or materials.
- Monitor or track project milestones and deliverables.
- Submit project deliverables, ensuring adherence to quality standards.
- Perform risk assessments to develop response strategies.
- Monitor and analyze system performance, such as network traffic, security, and capacity.
- Consult with users, administrators, and engineers to identify business and technical requirements for proposed system modifications or technology purchases.
- Implement system renovation projects in collaboration with technical staff, engineering consultants, installers, and vendors.
- Keep abreast of changes in industry practices and emerging telecommunications technology by reviewing current literature, talking with colleagues, participating in educational programs, attending meetings or workshops, or participating in professional organizations or conferences.
- Review and evaluate requests from engineers, managers, and technicians for system modifications.
- Assess existing facilities' needs for new or modified telecommunications systems.
- Develop, maintain, or implement telecommunications disaster recovery plans to ensure business continuity.
- Communicate with telecommunications vendors to obtain pricing and technical specifications for available hardware, software, or services.
- Inspect sites to determine physical configuration, such as device locations and conduit pathways.
- Document procedures for hardware and software installation and use.
- Install, or coordinate installation of, new or modified hardware, software, or programming modules of telecommunications systems.
- Instruct in use of voice, video, and data communications systems.
- Implement or perform preventive maintenance, backup, or recovery procedures.
- Prepare purchase requisitions for computer hardware and software, networking and telecommunications equipment, test equipment, cabling, or tools.
- Document technical specifications and operating standards for telecommunications equipment.
- Provide user support by diagnosing network and device problems and implementing technical or procedural solutions.
- Document user support activity, such as system problems, corrective actions, resolution status, and completed equipment installations.
- Estimate costs for system or component implementation and operation.
- Order or maintain inventory of telecommunications equipment for customer premises equipment (CPE), facilities, access networks, or backbone networks.
- Work with personnel and facilities management staff to install, remove, or relocate user connectivity equipment and devices.
- Use computer-aided design (CAD) software to prepare or evaluate network diagrams, floor plans, or site configurations for existing facilities, renovations, or new systems.
- Prepare system activity and performance reports.
- Implement controls to provide security for operating systems, software, and data.
- Manage user access to systems and equipment through account management and password administration.
- Test and evaluate hardware and software to determine efficiency, reliability, or compatibility with existing systems.
- Supervise maintenance of telecommunications equipment.
- Monitor and analyze system performance, such as network traffic, security, and capacity.