- Investigate whether networks, workstations, the central processing unit of the system, or peripheral equipment are responding to a program's instructions.
Occupations with related tasks Save Table: XLSX CSV
- Test system modifications to prepare for implementation.
- Conduct software compatibility tests with programs, hardware, operating systems, or network environments.
- Identify program deviance from standards, and suggest modifications to ensure compliance.
- Perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.
- Coordinate user or third-party testing.
- Visit beta testing sites to evaluate software performance.
- Identify, analyze, and document problems with program function, output, online screen, or content.
- Document software defects, using a bug tracking system, and report defects to software developers.
- Develop testing programs that address areas such as database impacts, software scenarios, regression testing, negative testing, error or bug retests, or usability.
- Design test plans, scenarios, scripts, or procedures.
- Document test procedures to ensure replicability and compliance with standards.
- Provide feedback and recommendations to developers on software usability and functionality.
- Install, maintain, or use software testing programs.
- Create or maintain databases of known test defects.
- Develop or specify standards, methods, or procedures to determine product quality or release readiness.
- Monitor bug resolution efforts and track successes.
- Update automated test scripts to ensure currency.
- Participate in product design reviews to provide input on functional requirements, product designs, schedules, or potential problems.
- Plan test schedules or strategies in accordance with project scope or delivery dates.
- Monitor program performance to ensure efficient and problem-free operations.
- Investigate customer problems referred by technical support.
- Review software documentation to ensure technical accuracy, compliance, or completeness, or to mitigate risks.
- Design or develop automated testing tools.
- Install and configure recreations of software production environments to allow testing of software performance.
- Collaborate with field staff or customers to evaluate or diagnose problems and recommend possible solutions.
- Conduct historical analyses of test results.
- Evaluate or recommend software for testing or bug tracking.
- Modify existing software to correct errors, allow it to adapt to new hardware, or to improve its performance.
- Recommend purchase of equipment to control dust, temperature, or humidity in area of system installation.
- Store, retrieve, and manipulate data for analysis of system capabilities and requirements.
- Test system modifications to prepare for implementation.
- Conduct software compatibility tests with programs, hardware, operating systems, or network environments.
- Identify program deviance from standards, and suggest modifications to ensure compliance.
- Perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.
- Coordinate user or third-party testing.
- Visit beta testing sites to evaluate software performance.
- Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
- Test repaired items to ensure proper operation.
- Test computer software or hardware, using standard diagnostic testing equipment and procedures.
- Back up network data.
- Configure security settings or access permissions for groups or individuals.
- Analyze and report computer network security breaches or attempted breaches.
- Identify the causes of networking problems, using diagnostic testing software and equipment.
- Document network support activities.
- Configure wide area network (WAN) or local area network (LAN) routers or related equipment.
- Install network software, including security or firewall software.
- Troubleshoot network or connectivity problems for users or user groups.
- Provide telephone support related to networking or connectivity issues.
- Analyze network data to determine network usage, disk space availability, or server function.
- Perform routine maintenance or standard repairs to networking components or equipment.
- Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.
- Install new hardware or software systems or components, ensuring integration with existing network systems.
- Install or repair network cables, including fiber optic cables.
- Monitor industry Web sites or publications for information about patches, releases, viruses, or potential problem identification.
- Create or update technical documentation for network installations or changes to existing installations.
- Train users in procedures related to network applications software or related systems.
- Install and configure wireless networking equipment.
- Maintain logs of network activity.
- Document help desk requests and resolutions.
- Research hardware or software products to meet technical networking or security needs.
- Create or revise user instructions, procedures, or manuals.
- Run monthly network reports.
- Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
- Test repaired items to ensure proper operation.
- Test computer software or hardware, using standard diagnostic testing equipment and procedures.
- Verify stability, interoperability, portability, security, or scalability of system architecture.
- Research, test, or verify proper functioning of software patches and fixes.
- Design and conduct hardware or software tests.
- Communicate with staff or clients to understand specific system requirements.
- Investigate system component suitability for specified purposes, and make recommendations regarding component use.
- Provide customers or installation teams guidelines for implementing secure systems.
- Direct the analysis, development, and operation of complete computer systems.
- Direct the installation of operating systems, network or application software, or computer or network hardware.
- Monitor system operation to detect potential problems.
- Identify system data, hardware, or software components required to meet user needs.
- Perform ongoing hardware and software maintenance operations, including installing or upgrading hardware or software.
- Configure servers to meet functional specifications.
- Collaborate with engineers or software developers to select appropriate design solutions or ensure the compatibility of system components.
- Evaluate existing systems to determine effectiveness, and suggest changes to meet organizational requirements.
- Document design specifications, installation instructions, and other system-related information.
- Perform security analyses of developed or packaged software components.
- Provide technical guidance or support for the development or troubleshooting of systems.
- Define and analyze objectives, scope, issues, or organizational impact of information systems.
- Establish functional or system standards to address operational requirements, quality requirements, and design constraints.
- Develop system engineering, software engineering, system integration, or distributed system architectures.
- Provide advice on project costs, design concepts, or design changes.
- Evaluate current or emerging technologies to consider factors such as cost, portability, compatibility, or usability.
- Develop or approve project plans, schedules, or budgets.
- Communicate project information through presentations, technical reports, or white papers.
- Train system users in system operation or maintenance.
- Complete models and simulations, using manual or automated tools, to analyze or predict system performance under different operating conditions.
- Develop efficient and effective system controllers.
- Develop application-specific software.
- Verify stability, interoperability, portability, security, or scalability of system architecture.
- Research, test, or verify proper functioning of software patches and fixes.
- Design and conduct hardware or software tests.
- Test issues such as system integration, performance, and system security on a regular schedule or after any major program modifications.
- Check and analyze operating system or application log files regularly to verify proper system performance.
- Test new software packages for use in Web operations or other applications.
- Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.
- Identify or document backup or recovery plans.
- Back up or modify applications and related data to provide for disaster recovery.
- Correct testing-identified problems, or recommend actions for their resolution.
- Identify, standardize, and communicate levels of access and security.
- Determine sources of Web page or server problems, and take action to correct such problems.
- Implement updates, upgrades, and patches in a timely manner to limit loss of service.
- Implement Web site security measures, such as firewalls or message encryption.
- Collaborate with development teams to discuss, analyze, or resolve usability issues.
- Perform user testing or usage analyses to determine Web sites' effectiveness or usability.
- Document application and Web site changes or change procedures.
- Track, compile, and analyze Web site usage data.
- Test backup or recovery plans regularly and resolve any problems.
- Recommend Web site improvements, and develop budgets to support recommendations.
- Review or update Web page content or links in a timely manner, using appropriate tools.
- Install or configure Web server software or hardware to ensure that directory structure is well-defined, logical, and secure, and that files are named properly.
- Gather, analyze, or document user feedback to locate or resolve sources of problems.
- Set up or maintain monitoring tools on Web servers or Web sites.
- Monitor Web developments through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Develop or document style guidelines for Web site content.
- Develop Web site performance metrics.
- Collaborate with Web developers to create and operate internal and external Web sites, or to manage projects, such as e-marketing campaigns.
- Identify or address interoperability requirements.
- Develop or implement procedures for ongoing Web site revision.
- Provide training or technical assistance in Web site implementation or use.
- Evaluate testing routines or procedures for adequacy, sufficiency, and effectiveness.
- Inform Web site users of problems, problem resolutions, or application changes and updates.
- Document installation or configuration procedures to allow maintenance and repetition.
- Develop testing routines and procedures.
- Develop and implement marketing plans for home pages, including print advertising or advertisement rotation.
- Evaluate or recommend server hardware or software.
- Administer internet or intranet infrastructure, including Web, file, and mail servers.
- Test issues such as system integration, performance, and system security on a regular schedule or after any major program modifications.
- Check and analyze operating system or application log files regularly to verify proper system performance.
- Test new software packages for use in Web operations or other applications.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Assess blockchain threats, such as untested code and unprotected keys.
- Automate the deployment of software updates over geographically distributed network nodes.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Design and develop blockchain technologies for industries such as finance and music.
- Design and implement dashboard and data visualizations to meet customer reporting needs.
- Design and implement data repositories to integrate data.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Develop a maintainable code base using object-oriented design principles, practices, or patterns.
- Discuss and plan systems with solution architects, system engineers, or cybersecurity experts to meet customer requirements.
- Discuss data needs with engineers, product managers, or data scientists to identify blockchain requirements.
- Evaluate blockchain processes or risks based on security assessments or control matrix reviews.
- Evaluate new blockchain technologies and vendor products.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Update client and server applications responsible for integration and business logic.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Document computer security and emergency measures policies, procedures, and tests.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
- Monitor use of data files and regulate access to safeguard information in computer files.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
- Train users and promote security awareness to ensure system security and to improve server and network efficiency.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Design, develop, select, test, implement, and evaluate new or modified informatics solutions, data structures, and decision-support mechanisms to support patients, health care professionals, and their information management and human-computer and human-technology interactions within health care contexts.
- Translate nursing practice information between nurses and systems engineers, analysts, or designers, using object-oriented models or other techniques.
- Use informatics science to design or implement health information technology applications for resolution of clinical or health care administrative problems.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Analyze and interpret patient, nursing, or information systems data to improve nursing services.
- Identify, collect, record, or analyze data relevant to the nursing care of patients.
- Apply knowledge of computer science, information science, nursing, and informatics theory to nursing practice, education, administration, or research, in collaboration with other health informatics specialists.
- Develop, implement, or evaluate health information technology applications, tools, processes, or structures to assist nurses with data management.
- Disseminate information about nursing informatics science and practice to the profession, other health care professions, nursing students, and the public.
- Analyze computer and information technologies to determine applicability to nursing practice, education, administration, and research.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Read current literature, talk with colleagues, and participate in professional organizations or conferences to keep abreast of developments in informatics.
- Develop or deliver training programs for health information technology, creating operating manuals as needed.
- Design, conduct, or provide support to nursing informatics research.
- Inform local, state, national, and international health policies related to information management and communication, confidentiality and security, patient safety, infrastructure development, and economics.
- Provide consultation to nurses regarding hardware or software configuration.
- Plan, install, repair, or troubleshoot telehealth technology applications or systems in homes.
- Design, develop, select, test, implement, and evaluate new or modified informatics solutions, data structures, and decision-support mechanisms to support patients, health care professionals, and their information management and human-computer and human-technology interactions within health care contexts.
- Test changes to database applications or systems.
- Modify existing databases and database management systems or direct programmers and analysts to make changes.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Plan and install upgrades of database management system software to enhance database performance.
- Specify users and user access levels for each segment of database.
- Test programs or databases, correct errors, and make necessary modifications.
- Train users and answer questions.
- Provide technical support to junior staff or clients.
- Approve, schedule, plan, and supervise the installation and testing of new products and improvements to computer systems, such as the installation of new databases.
- Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
- Write and code logical and physical database descriptions and specify identifiers of database to management system, or direct others in coding descriptions.
- Develop data models describing data elements and how they are used, following procedures and using pen, template, or computer software.
- Select and enter codes to monitor database performance and to create production databases.
- Identify, evaluate and recommend hardware or software technologies to achieve desired database performance.
- Review procedures in database management system manuals to make changes to database.
- Identify and evaluate industry trends in database systems to serve as a source of information and advice for upper management.
- Review workflow charts developed by programmer analyst to understand tasks computer will perform, such as updating records.
- Revise company definition of data as defined in data dictionary.
- Test changes to database applications or systems.
- Scan networks, using vulnerability assessment tools to identify vulnerabilities.
- Assess the quality of security controls, using performance indicators.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Coordinate vulnerability assessments or analysis of information security systems.
- Develop information security standards and best practices.
- Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
- Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
- Develop response and recovery strategies for security breaches.
- Identify or implement solutions to information security problems.
- Identify security system weaknesses, using penetration tests.
- Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
- Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
- Provide technical support to computer users for installation and use of security products.
- Recommend information security enhancements to management.
- Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
- Train staff on, and oversee the use of, information security standards, policies, and best practices.
- Troubleshoot security and network problems.
- Write reports regarding investigations of information security breaches or network evaluations.
- Scan networks, using vulnerability assessment tools to identify vulnerabilities.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Conduct network and security system audits, using established criteria.
- Configure information systems to incorporate principles of least functionality and least access.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop presentations on threat intelligence.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Identify security system weaknesses, using penetration tests.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Develop computer programs to collect meteorological data or to present meteorological information.
- Develop or use mathematical or computer models for weather forecasting.
- Interpret data, reports, maps, photographs, or charts to predict long- or short-range weather conditions, using computer models and knowledge of climate theory, physics, and mathematics.
- Conduct meteorological research into the processes or determinants of atmospheric phenomena, weather, or climate.
- Broadcast weather conditions, forecasts, or severe weather warnings to the public via television, radio, or the Internet or provide this information to the news media.
- Prepare forecasts or briefings to meet the needs of industry, business, government, or other groups.
- Gather data from sources such as surface or upper air stations, satellites, weather bureaus, or radar for use in meteorological reports or forecasts.
- Prepare weather reports or maps for analysis, distribution, or use in weather broadcasts, using computer graphics.
- Develop and deliver training on weather topics.
- Prepare scientific atmospheric or climate reports, articles, or texts.
- Analyze climate data sets, using techniques such as geophysical fluid dynamics, data assimilation, or numerical modeling.
- Analyze historical climate information, such as precipitation or temperature records, to help predict future weather or climate trends.
- Consult with other offices, agencies, professionals, or researchers regarding the use and interpretation of climatological information for weather predictions and warnings.
- Speak to the public to discuss weather topics or answer questions.
- Apply meteorological knowledge to issues such as global warming, pollution control, or ozone depletion.
- Measure wind, temperature, and humidity in the upper atmosphere, using weather balloons.
- Direct forecasting services at weather stations or at radio or television broadcasting facilities.
- Collect air samples from planes or ships over land or sea to study atmospheric composition.
- Teach college-level courses on topics such as atmospheric and space science, meteorology, or global climate change.
- Design or develop new equipment or methods for meteorological data collection, remote sensing, or related applications.
- Research the impact of industrial projects or pollution on climate, air quality, or weather phenomena.
- Conduct wind assessment, integration, or validation studies.
- Conduct numerical simulations of climate conditions to understand and predict global or regional weather patterns.
- Estimate or predict the effects of global warming over time for specific geographic regions.
- Create visualizations to illustrate historical or future changes in the Earth's climate, using paleoclimate or climate geographic information systems (GIS) databases.
- Formulate predictions by interpreting environmental data, such as meteorological, atmospheric, oceanic, paleoclimate, climate, or related information.
- Perform managerial duties, such as creating work schedules, creating or implementing staff training, matching staff expertise to situations, or analyzing performance of offices.
- Develop computer programs to collect meteorological data or to present meteorological information.