- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Occupations with related tasks Save Table: XLSX CSV
- Perform data backups and disaster recovery operations.
- Configure, monitor, and maintain email applications or virus protection software.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
- Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Analyze equipment performance records to determine the need for repair or replacement.
- Confer with network users about solutions to existing system problems.
- Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Design, configure, and test computer hardware, networking software and operating system software.
- Perform routine network startup and shutdown procedures, and maintain control records.
- Load computer tapes and disks, and install software and printer paper or forms.
- Train people in computer system use.
- Maintain logs related to network functions, as well as maintenance and repair records.
- Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
- Coordinate with vendors and with company personnel to facilitate purchases.
- Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system.
- Maintain an inventory of parts for emergency repairs.
- Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
- Perform data backups and disaster recovery operations.
- Configure, monitor, and maintain email applications or virus protection software.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Implement or perform preventive maintenance, backup, or recovery procedures.
- Implement controls to provide security for operating systems, software, and data.
- Manage user access to systems and equipment through account management and password administration.
- Consult with users, administrators, and engineers to identify business and technical requirements for proposed system modifications or technology purchases.
- Implement system renovation projects in collaboration with technical staff, engineering consultants, installers, and vendors.
- Keep abreast of changes in industry practices and emerging telecommunications technology by reviewing current literature, talking with colleagues, participating in educational programs, attending meetings or workshops, or participating in professional organizations or conferences.
- Review and evaluate requests from engineers, managers, and technicians for system modifications.
- Assess existing facilities' needs for new or modified telecommunications systems.
- Develop, maintain, or implement telecommunications disaster recovery plans to ensure business continuity.
- Communicate with telecommunications vendors to obtain pricing and technical specifications for available hardware, software, or services.
- Inspect sites to determine physical configuration, such as device locations and conduit pathways.
- Document procedures for hardware and software installation and use.
- Install, or coordinate installation of, new or modified hardware, software, or programming modules of telecommunications systems.
- Instruct in use of voice, video, and data communications systems.
- Prepare purchase requisitions for computer hardware and software, networking and telecommunications equipment, test equipment, cabling, or tools.
- Document technical specifications and operating standards for telecommunications equipment.
- Provide user support by diagnosing network and device problems and implementing technical or procedural solutions.
- Document user support activity, such as system problems, corrective actions, resolution status, and completed equipment installations.
- Estimate costs for system or component implementation and operation.
- Order or maintain inventory of telecommunications equipment for customer premises equipment (CPE), facilities, access networks, or backbone networks.
- Work with personnel and facilities management staff to install, remove, or relocate user connectivity equipment and devices.
- Use computer-aided design (CAD) software to prepare or evaluate network diagrams, floor plans, or site configurations for existing facilities, renovations, or new systems.
- Prepare system activity and performance reports.
- Test and evaluate hardware and software to determine efficiency, reliability, or compatibility with existing systems.
- Monitor and analyze system performance, such as network traffic, security, and capacity.
- Supervise maintenance of telecommunications equipment.
- Implement or perform preventive maintenance, backup, or recovery procedures.
- Implement controls to provide security for operating systems, software, and data.
- Manage user access to systems and equipment through account management and password administration.
- Implement updates, upgrades, and patches in a timely manner to limit loss of service.
- Implement Web site security measures, such as firewalls or message encryption.
- Back up or modify applications and related data to provide for disaster recovery.
- Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.
- Identify or document backup or recovery plans.
- Correct testing-identified problems, or recommend actions for their resolution.
- Identify, standardize, and communicate levels of access and security.
- Determine sources of Web page or server problems, and take action to correct such problems.
- Collaborate with development teams to discuss, analyze, or resolve usability issues.
- Test issues such as system integration, performance, and system security on a regular schedule or after any major program modifications.
- Perform user testing or usage analyses to determine Web sites' effectiveness or usability.
- Document application and Web site changes or change procedures.
- Track, compile, and analyze Web site usage data.
- Test backup or recovery plans regularly and resolve any problems.
- Recommend Web site improvements, and develop budgets to support recommendations.
- Review or update Web page content or links in a timely manner, using appropriate tools.
- Install or configure Web server software or hardware to ensure that directory structure is well-defined, logical, and secure, and that files are named properly.
- Gather, analyze, or document user feedback to locate or resolve sources of problems.
- Set up or maintain monitoring tools on Web servers or Web sites.
- Monitor Web developments through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Develop or document style guidelines for Web site content.
- Develop Web site performance metrics.
- Collaborate with Web developers to create and operate internal and external Web sites, or to manage projects, such as e-marketing campaigns.
- Identify or address interoperability requirements.
- Develop or implement procedures for ongoing Web site revision.
- Check and analyze operating system or application log files regularly to verify proper system performance.
- Provide training or technical assistance in Web site implementation or use.
- Evaluate testing routines or procedures for adequacy, sufficiency, and effectiveness.
- Inform Web site users of problems, problem resolutions, or application changes and updates.
- Document installation or configuration procedures to allow maintenance and repetition.
- Develop testing routines and procedures.
- Test new software packages for use in Web operations or other applications.
- Develop and implement marketing plans for home pages, including print advertising or advertisement rotation.
- Evaluate or recommend server hardware or software.
- Administer internet or intranet infrastructure, including Web, file, and mail servers.
- Implement updates, upgrades, and patches in a timely manner to limit loss of service.
- Implement Web site security measures, such as firewalls or message encryption.
- Back up or modify applications and related data to provide for disaster recovery.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Assess blockchain threats, such as untested code and unprotected keys.
- Automate the deployment of software updates over geographically distributed network nodes.
- Design and develop blockchain technologies for industries such as finance and music.
- Design and implement dashboard and data visualizations to meet customer reporting needs.
- Design and implement data repositories to integrate data.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Develop a maintainable code base using object-oriented design principles, practices, or patterns.
- Discuss and plan systems with solution architects, system engineers, or cybersecurity experts to meet customer requirements.
- Discuss data needs with engineers, product managers, or data scientists to identify blockchain requirements.
- Evaluate blockchain processes or risks based on security assessments or control matrix reviews.
- Evaluate new blockchain technologies and vendor products.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Update client and server applications responsible for integration and business logic.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Specify users and user access levels for each segment of database.
- Modify existing databases and database management systems or direct programmers and analysts to make changes.
- Plan and install upgrades of database management system software to enhance database performance.
- Test changes to database applications or systems.
- Test programs or databases, correct errors, and make necessary modifications.
- Train users and answer questions.
- Provide technical support to junior staff or clients.
- Approve, schedule, plan, and supervise the installation and testing of new products and improvements to computer systems, such as the installation of new databases.
- Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
- Write and code logical and physical database descriptions and specify identifiers of database to management system, or direct others in coding descriptions.
- Develop data models describing data elements and how they are used, following procedures and using pen, template, or computer software.
- Select and enter codes to monitor database performance and to create production databases.
- Identify, evaluate and recommend hardware or software technologies to achieve desired database performance.
- Review procedures in database management system manuals to make changes to database.
- Identify and evaluate industry trends in database systems to serve as a source of information and advice for upper management.
- Review workflow charts developed by programmer analyst to understand tasks computer will perform, such as updating records.
- Revise company definition of data as defined in data dictionary.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Specify users and user access levels for each segment of database.
- Configure security settings or access permissions for groups or individuals.
- Analyze and report computer network security breaches or attempted breaches.
- Identify the causes of networking problems, using diagnostic testing software and equipment.
- Document network support activities.
- Configure wide area network (WAN) or local area network (LAN) routers or related equipment.
- Install network software, including security or firewall software.
- Troubleshoot network or connectivity problems for users or user groups.
- Provide telephone support related to networking or connectivity issues.
- Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
- Analyze network data to determine network usage, disk space availability, or server function.
- Perform routine maintenance or standard repairs to networking components or equipment.
- Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.
- Install new hardware or software systems or components, ensuring integration with existing network systems.
- Test computer software or hardware, using standard diagnostic testing equipment and procedures.
- Install or repair network cables, including fiber optic cables.
- Monitor industry Web sites or publications for information about patches, releases, viruses, or potential problem identification.
- Create or update technical documentation for network installations or changes to existing installations.
- Train users in procedures related to network applications software or related systems.
- Test repaired items to ensure proper operation.
- Install and configure wireless networking equipment.
- Maintain logs of network activity.
- Document help desk requests and resolutions.
- Research hardware or software products to meet technical networking or security needs.
- Create or revise user instructions, procedures, or manuals.
- Run monthly network reports.
- Configure security settings or access permissions for groups or individuals.
- Back up network data.
- Design and implement Web site security measures, such as firewalls and message encryption.
- Back up files from Web sites to local directories for instant recovery in case of problems.
- Write supporting code for Web applications or Web sites.
- Design, build, or maintain Web sites, using authoring or scripting languages, content creation tools, management tools, and digital media.
- Select programming languages, design tools, or applications.
- Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.
- Develop databases that support Web applications and Web sites.
- Perform Web site tests according to planned schedules, or after any Web site or product revision.
- Perform or direct Web site updates.
- Maintain understanding of current Web technologies or programming practices through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Analyze user needs to determine technical requirements.
- Respond to user email inquiries, or set up automated systems to send responses.
- Renew domain name registrations.
- Confer with management or development teams to prioritize needs, resolve conflicts, develop content criteria, or choose solutions.
- Communicate with network personnel or Web site hosting agencies to address hardware or software issues affecting Web sites.
- Collaborate with management or users to develop e-commerce strategies and to integrate these strategies with Web sites.
- Document test plans, testing procedures, or test results.
- Establish appropriate server directory trees.
- Recommend and implement performance improvements.
- Document technical factors such as server load, bandwidth, database performance, and browser and device types.
- Develop or implement procedures for ongoing Web site revision.
- Create Web models or prototypes that include physical, interface, logical, or data models.
- Provide clear, detailed descriptions of Web site specifications, such as product features, activities, software, communication protocols, programming languages, and operating systems software and hardware.
- Evaluate or recommend server hardware or software.
- Monitor security system performance logs to identify problems and notify security specialists when problems occur.
- Install and configure hypertext transfer protocol (HTTP) servers and associated operating systems.
- Research, document, rate, or select alternatives for Web architecture or technologies.
- Develop system interaction or sequence diagrams.
- Incorporate technical considerations into Web site design plans, such as budgets, equipment, performance requirements, and legal issues including accessibility and privacy.
- Design and implement Web site security measures, such as firewalls and message encryption.
- Back up files from Web sites to local directories for instant recovery in case of problems.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Translate nursing practice information between nurses and systems engineers, analysts, or designers, using object-oriented models or other techniques.
- Use informatics science to design or implement health information technology applications for resolution of clinical or health care administrative problems.
- Analyze and interpret patient, nursing, or information systems data to improve nursing services.
- Identify, collect, record, or analyze data relevant to the nursing care of patients.
- Apply knowledge of computer science, information science, nursing, and informatics theory to nursing practice, education, administration, or research, in collaboration with other health informatics specialists.
- Develop, implement, or evaluate health information technology applications, tools, processes, or structures to assist nurses with data management.
- Design, develop, select, test, implement, and evaluate new or modified informatics solutions, data structures, and decision-support mechanisms to support patients, health care professionals, and their information management and human-computer and human-technology interactions within health care contexts.
- Disseminate information about nursing informatics science and practice to the profession, other health care professions, nursing students, and the public.
- Analyze computer and information technologies to determine applicability to nursing practice, education, administration, and research.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Read current literature, talk with colleagues, and participate in professional organizations or conferences to keep abreast of developments in informatics.
- Develop or deliver training programs for health information technology, creating operating manuals as needed.
- Design, conduct, or provide support to nursing informatics research.
- Inform local, state, national, and international health policies related to information management and communication, confidentiality and security, patient safety, infrastructure development, and economics.
- Provide consultation to nurses regarding hardware or software configuration.
- Plan, install, repair, or troubleshoot telehealth technology applications or systems in homes.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Prepare and structure data warehouses for storing data.
- Analyze and interpret statistical data to identify significant differences in relationships among sources of information.
- Evaluate the statistical methods and procedures used to obtain data to ensure validity, applicability, efficiency, and accuracy.
- Report results of statistical analyses, including information in the form of graphs, charts, and tables.
- Determine whether statistical methods are appropriate, based on user needs or research questions of interest.
- Prepare data for processing by organizing information, checking for inaccuracies, and adjusting and weighting the raw data.
- Develop and test experimental designs, sampling techniques, and analytical methods.
- Identify relationships and trends in data, as well as any factors that could affect the results of research.
- Present statistical and nonstatistical results, using charts, bullets, and graphs, in meetings or conferences to audiences such as clients, peers, and students.
- Design research projects that apply valid scientific techniques, and use information obtained from baselines or historical data to structure uncompromised and efficient analyses.
- Adapt statistical methods to solve specific problems in many fields, such as economics, biology, and engineering.
- Evaluate sources of information to determine any limitations, in terms of reliability or usability.
- Process large amounts of data for statistical modeling and graphic analysis, using computers.
- Develop software applications or programming for statistical modeling and graphic analysis.
- Report results of statistical analyses in peer-reviewed papers and technical manuals.
- Plan data collection methods for specific projects, and determine the types and sizes of sample groups to be used.
- Apply sampling techniques, or use complete enumeration bases to determine and define groups to be surveyed.
- Examine theories, such as those of probability and inference, to discover mathematical bases for new or improved methods of obtaining and evaluating numerical data.
- Supervise and provide instructions for workers collecting and tabulating data.
- Prepare and structure data warehouses for storing data.
- Identify or implement solutions to information security problems.
- Assess the quality of security controls, using performance indicators.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Coordinate vulnerability assessments or analysis of information security systems.
- Develop information security standards and best practices.
- Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
- Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
- Develop response and recovery strategies for security breaches.
- Identify security system weaknesses, using penetration tests.
- Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
- Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
- Provide technical support to computer users for installation and use of security products.
- Recommend information security enhancements to management.
- Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
- Scan networks, using vulnerability assessment tools to identify vulnerabilities.
- Train staff on, and oversee the use of, information security standards, policies, and best practices.
- Troubleshoot security and network problems.
- Write reports regarding investigations of information security breaches or network evaluations.
- Identify or implement solutions to information security problems.
- Administer document and system access rights and revision control to ensure security of system and integrity of master documents.
- Assist in determining document management policies to facilitate efficient, legal, and secure access to electronic content.
- Assist in the development of document or content classification taxonomies to facilitate information capture, search, and retrieval.
- Implement electronic document processing, retrieval, and distribution systems in collaboration with other information technology specialists.
- Identify and classify documents or other electronic content according to characteristics such as security level, function, and metadata.
- Develop, document, or maintain standards, best practices, or system usage procedures.
- Assist in the assessment, acquisition, or deployment of new electronic document management systems.
- Prepare and record changes to official documents and confirm changes with legal and compliance management staff, including enterprise-wide records management staff.
- Write, review, or execute plans for testing new or established document management systems.
- Monitor regulatory activity to maintain compliance with records and document management laws.
- Retrieve electronic assets from repository for distribution to users, collecting and returning to repository, if necessary.
- Keep abreast of developments in document management technologies and techniques by reviewing current literature, talking with colleagues, participating in educational programs, attending meetings or workshops, or participating in professional organizations or conferences.
- Conduct needs assessments to identify document management requirements of departments or end users.
- Develop or configure document management system features, such as user interfaces, access profiles, and document workflow procedures.
- Document technical functions and specifications for new or proposed content management systems.
- Exercise security surveillance over document processing, reproduction, distribution, storage, or archiving.
- Consult with end users regarding problems in accessing electronic content.
- Propose recommendations for improving content management system capabilities.
- Operate data capture technology to import digitized documents into document management system.
- Prepare support documentation and training materials for end users of document management systems.
- Search electronic sources, such as databases or repositories, or manual sources for information.
- Implement scanning or other automated data entry procedures, using imaging devices and document imaging software.
- Analyze, interpret, or disseminate system performance data.
- Administer document and system access rights and revision control to ensure security of system and integrity of master documents.