CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS F CH-48

Size: px
Start display at page:

Download "CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67F CH-48"

Transcription

1 CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS F CH-48 Updated: October 2011

2 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN (IT) SCOPE OF RATING GENERAL INFORMATION INFORMATION TECHNOLOGY NETWORK TECHNICIAN COMMUNICATIONS SECURITY INFORMATION ASSURANCE NETWORK ADMINISTRATION NETWORK MANAGEMENT NETWORK SYSTEM OPERATIONS INFORMATION TECHNOLOGY SECURITY MANAGER COMMUNICATIONS SECURITY COMMUNICATIONS SYSTEM OPERATIONS MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION INFORMATION TECHNOLOGY SECURITY TECHNICIAN COMMUNICATIONS SECURITY INFORMATION ASSURANCE MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION INFORMATION TECHNOLOGY COMMUNICATION TECHNICIAN COMMUNICATIONS SYSTEM OPERATIONS MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION IT-3 IT-4 IT-5 IT-5 IT-5 IT-5 IT-7 IT-7 IT-9 IT-9 IT-11 IT-12 IT-12 IT-13 IT-13 IT-13 IT-14 IT-14 IT-15 IT-15 IT-17 IT-18 IT-2

3 NAVY ENLISTED OCCUPATIONAL STANDARDS FOR INFORMATION SYSTEMS TECHNICIAN (IT) SCOPE OF RATING Information System Technicians perform core and specialty functions of communications operations, message processing, and network administration and security; establish, monitor, and maintain Radio Frequency (RF) communications systems; perform spectrum management within an area of responsibility; handle, store, and retrieve incoming and outgoing messages; perform network system administration, maintenance and training; manage, plan and coordinate unit-level information systems security and integration across platforms, fleets, and services; and ensure the proper security, distribution, handling, accounting, reporting, and control of Communications Security (COMSEC) materials, systems, and equipment. These Occupational Standards are to be incorporated in Volume I, Part B, of the Manual of Navy Enlisted Manpower and Personnel Classifications and Occupational Standards (NAVPERS 18068F) as Chapter 67. IT-3

4 GENERAL INFORMATION CAREER PATTERN ITCM ITCS ITC IT1 IT2 IT3 SEAMAN APPRENTICESHIP Normal path of advancement to Chief Warrant Officer and Limited Duty Officer categories can be found in OPNAVINST For rating entry requirements, refer to MILPERSMAN SAFETY The observance of Operational Risk Management (ORM) and proper safety precautions in all areas is an integral part of each billet and the responsibility of every Sailor; therefore, it is a universal requirement for all ratings. IT-4

5 Job Title Job Code Information Technology Network Technician Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Management TBD INFOR TECHNOLOGY NETWORK TECH IT NET TEC Pay Plan Career Field Other Relationships and Rules: Enlisted IT NEC 2709, 2710, 2720, 2730, 2735, 2777, 2778 Job Description Information Technology Network Technicians perform core and specialty functions of network administration; install applications and peripherals, troubleshoot user problems, and provide assistance with the use of computer hardware and software including printers, wordprocessors, electronic mail systems, and operating systems; conduct system backups and restores; utilize knowledge of database management systems to maintain, administer, test, and implement computer databases; and work with General Service (GENSER), unclassified, and Special Intelligence (SI) systems including Global Command and Control System-Maritime (GCCS-M), Navy Tactical Command Support Systems (NTCSS), Tactical Support Center (TSC) data processing systems, Integrated Bridge Systems (IBS), Integrated Communications and Advanced Networks (ICAN), Shipboard Wide-Area-Networks (SWAN), and ship s control or engineering systems. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General Computer and Information Management Systems Managers Skills Critical Thinking Installation Management of Material Resources Monitoring Operation and Control Repairing Systems Analysis Technology and Design Troubleshooting Writing Abilities Category Flexibility Control Precision Deductive Reasoning Inductive Reasoning Information Ordering Mathematical Reasoning Oral Expression Problem Sensitivity Written Comprehension Written Expression COMMUNICATIONS SECURITY E4 CORE Distribute Communication Security (COMSEC) Material E6 CORE Issue Electronic Key Management System (EKMS) materials to local elements E6 CORE Transfer custody of Electronic Key Management System (EKMS) material INFORMATION ASSURANCE E7 CORE Manage Information Assurance (IA) workforce Information Professional (IP) programs E6 CORE Manage Information Assurance (IA) workforce Information Professional (IP) training programs NETWORK ADMINISTRATION E5 CORE Administer computer Information System (IS) user accounts E5 CORE Analyze audit logs E4 CORE Back up computer Information Systems (IS) E5 CORE Back-up network systems E4 CORE Configure computer application software IT-5

6 E4 CORE Configure external peripherals E6 CORE Configure network auditing logs E5 CORE Configure network hardware E5 CORE Configure network software E5 CORE Configure print services E5 CORE Configure server operating system software E4 CORE Configure workstation network connectivity E4 CORE Configure workstation Operating System (OS) software E7 CORE Construct networks E5 CORE Document network outages E5 CORE Document Operating System (OS) errors E5 CORE Document server outages E5 CORE Implement router Access Control Lists (ACL) E5 CORE Initialize network servers E4 CORE Install external peripherals E5 CORE Install network components E5 CORE Install network peripherals E5 CORE Install network software E5 CORE Install Operating Systems (OS) E5 CORE Maintain computer Information System (IS) servers E5 CORE Maintain network printers E5 CORE Manage computer Information System (IS) servers E5 CORE Manage file and folder accesses E6 CORE Manage network documentation E6 CORE Manage network system configurations E6 CORE Manage network system updates E4 CORE Monitor audit logs E5 CORE Monitor network equipment E5 CORE Monitor network software E5 CORE Monitor network systems E5 CORE Perform disk administration E6 CORE Perform trend analysis (hardware, software, or network) E7 CORE Plan network restorations E6 CORE Prepare network status reports E4 CORE Scan for viruses E5 CORE Shut down computer Information Systems (IS) E5 CORE Start up computer Information Systems (IS) IT-6

7 E5 CORE Test computer Information Systems (IS) E4 CORE Troubleshoot external peripherals E5 CORE Troubleshoot file and folder access problems E5 CORE Troubleshoot network hardware E5 CORE Troubleshoot Operating Systems (OS) E5 CORE Troubleshoot primary storage devices E4 CORE Troubleshoot workstation application software E4 CORE Troubleshoot workstation network connectivity E6 CORE Update computer configuration documentation NETWORK MANAGEMENT E6 CORE Configure domain system policies E7 CORE Configure Local Area Network (LAN) architecture E6 CORE Determine computer software for migration or installation E6 CORE Determine network migration and installation potential problems E6 CORE Determine network migrations and installation time requirements E6 CORE Determine network upgrade equipment E7 CORE Develop disaster recovery contingency plans E7 CORE Develop network plans E7 CORE Develop network policies E7 CORE Develop system life cycle plans E7 NON-CORE Estimate network migration or installation costs E7 CORE Implement Automated Information Systems (AIS) equipment and media disposition requirements E7 CORE Implement network policies E6 CORE Manage network system databases E6 CORE Manage networking solutions NETWORK SYSTEM OPERATIONS E5 CORE Administer accounts for domains E4 CORE Configure workstation internal core components E6 CORE Coordinate domain backup schedules E6 CORE Design network system databases E6 CORE Design web pages E5 CORE Identify Information Systems Security (ISS) incidents E7 CORE Implement new operating procedures for network users E6 CORE Inspect computer Information System (IS) components IT-7

8 E6 CORE Inspect network components E6 CORE Inspect system hardware E4 CORE Install primary storage devices E6 CORE Install Remote Access Servers (RAS) E4 CORE Install workstation internal core components E4 CORE Inventory computer Information System (IS) assets E4 CORE Maintain computer Information System (IS) logs E5 CORE Maintain network system databases E6 CORE Maintain software application scripts E5 CORE Maintain websites E5 CORE Manage Automated Data Processing (ADP) software E5 CORE Monitor customer trouble calls E5 CORE Troubleshoot Integrated Shipboard Network Systems (ISNS) E5 CORE Troubleshoot networks E5 CORE Troubleshoot server internal core components E4 CORE Troubleshoot workstation internal core components E6 CORE Write software application scripts IT-8

9 Job Title IT-9 Job Code Information Technology Security Manager Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Computer and Mathematical TBD INFOR TECHNOLOGY SECURITY MGR IT SEC MGR Pay Plan Career Field Proficiency Level Other Relationships and Rules: Enlisted IT J/M NEC 2779, 2781 Job Description Information Technology Security Managers plan, coordinate, and manage unit-level information systems security and integration across platforms, fleets, and services; direct Information Assurance (IA) programs and manage and implement information systems security countermeasures and network security programs; ensure the proper security, distribution, handling, accounting, reporting, and control of Communications Security (COMSEC) and Key Management Infrastructure (KMI) materials, systems, and equipment; develop and review Information Systems Security (ISS) accreditation packages; design, plan and prepare for network expansions and upgrades; prepare and review the checklist for Sensitive Compartmented Information Facility (SCIF) accreditation and periodic inspection; manage administrative functions and security procedures governing the special security program; and coordinate the allocation of personnel and financial resources, protection of classified information, and the training of Information Technology Specialists. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General Computer Security Specialists Computer and Mathematical Skills Coordination Critical Thinking Equipment Selection Management of Material Resources Management of Personnel Resources Operation and Control Operation Monitoring Quality Control Analysis Technology and Design Writing Abilities Category Flexibility Control Precision Deductive Reasoning Inductive Reasoning Information Ordering Oral Expression Problem Sensitivity Selective Attention Written Comprehension Written Expression COMMUNICATIONS SECURITY E6 CORE Administer access to symmetric Crypto Net E6 CORE Administer client platforms E4 CORE Administer deployed cryptologic tactical systems E6 CORE Administer High Assurance Platform (HAP) E6 CORE Administer High Assurance Platform (HAP) securities E6 CORE Administer Key Management Infrastructure (KMI) Operating Accounts (KOA) E6 CORE Administer Key Management Infrastructure (KMI) user accounts E6 CORE Administer the client platform securities E6 CORE Administer token security E6 CORE Assign product requestors E6 CORE Audit Key Management Infrastructure (KMI) management data E6 CORE Back up Key Management Infrastructure (KMI) accounts E7 CORE Brief communications security roles, responsibilities, obligations, and liabilities E7 CORE Configure Key Processors (KPs) E6 CORE Deregister Key Management Infrastructure (KMI) devices E6 CORE Destroy Communication Security (COMSEC) material

10 E6 CORE Destroy Key Management Infrastructure (KMI) products E6 CORE Develop Emergency Action Plans (EAP) E6 CORE Develop local Communications Security (COMSEC) handling instructions E6 CORE Develop network security instructions E6 CORE Develop system security certification and accreditation documentation E4 CORE Distribute Communications Security (COMSEC) material E6 CORE Endorse Key Management Infrastructure (KMI) Adware device to make key operational E6 CORE Endorse Key Management Infrastructure (KMI) devices E6 CORE Establish Key Management Infrastructure (KMI) new product requirements E6 CORE Generate Key Management Infrastructure (KMI) local electronic keys E6 CORE Generate Key Management Infrastructure (KMI) cryptologic product requests E6 CORE Generate local keys E6 CORE Identify Electronic Key Management System (EKMS) discrepancies E7 CORE Implement Communications Security (COMSEC) changes E7 CORE Implement Emergency Action Plans (EAP) E6 CORE Initialize access to asymmetric cryptologic network E6 CORE Initialize Key Management Infrastructure (KMI) devices E6 CORE Inspect security containers E6 CORE Install Key Management Infrastructure (KMI) system software E4 CORE Inventory Electronic Key Management System (EKMS) E6 CORE Issue Electronic Key Management System (EKMS) materials to local elements E6 CORE Issue Electronic Key Management System (EKMS) materials to users E6 CORE Issue Key Management Infrastructure (KMI) materials E5 CORE Maintain cryptographic equipment E6 CORE Maintain Electronic Key Management System (EKMS) databases E6 CORE Maintain Key Management Infrastructure (KMI) databases E6 CORE Maintain Key Management Infrastructure (KMI) equipment E4 CORE Maintain physical security of Secure Compartmental Information (SCI) computer Information Systems (IS) E6 CORE Manage access security controls E5 CORE Manage Crypto Ignition Keys (CIK) E6 CORE Manage Electronic Key Management System (EKMS) training programs E6 CORE Manage Key Management Infrastructure (KMI) Device Distribution Profiles (DDP) E4 CORE Manage Key Management Infrastructure (KMI) network connectivity E4 CORE Manage Key Management Infrastructure (KMI) production E6 CORE Manage Key Management Infrastructure (KMI) system configuration E6 CORE Manage Key Management Infrastructure (KMI) system reports IT-10

11 E6 CORE Manage tokens E6 CORE Monitor Key Management Infrastructure (KMI) platform security E6 CORE Order asymmetric products E6 CORE Order physical keying material E6 CORE Perform personalization of type 1 tokens E6 CORE Prepare local holder Electronic Key Management System (EKMS) reports E6 CORE Receive electronic Communications Security (COMSEC) material E4 CORE Receive electronic keying material via Over-the-Air-Transfers (OTAT) and Over- The-Air (OTAR) Rekeys E4 CORE Receive physical Communication Security (COMSEC) material E6 CORE Register Electronic Key Management System (EKMS) users E6 CORE Register Key Management Infrastructure (KMI) Operating Account (KOA) agents E7 CORE Register Key Management Infrastructure (KMI) users E6 CORE Register local Electronic Key Management System (EKMS) elements E6 CORE Relocate Key Management Infrastructure (KMI) accounts E7 CORE Report Communications Security (COMSEC) compliance E4 CORE Report Electronic Key Management System (EKMS) discrepancies E7 CORE Report Information Security (INFOSEC) compliance E6 CORE Report Key Management Infrastructure (KMI) violations E6 CORE Review Key Management Infrastructure (KMI) databases E4 CORE Safeguard classified material E4 CORE Set up cryptographic equipment E6 CORE Set up cryptographic networks E6 CORE Transfer custody of Electronic Key Management System (EKMS) material E6 CORE Transfer custody of Key Management Infrastructure (KMI) materials E6 CORE Update Device Distribution Profiles (DDP) E6 CORE Verify cryptographic equipment settings COMMUNICATIONS SYSTEM OPERATIONS E5 CORE Configure functions of Automated Digital Network Systems (ADNS) E4 NON-CORE Configure magnetic tape drives E4 NON-CORE Coordinate flight and squadron media E5 CORE Coordinate restoral with off site technician E5 CORE Disconnect data links E4 NON-CORE Initialize magnetic tapes drives E4 CORE Install electronic Communication Plans (COMPLAN) E4 CORE Load image software IT-11

12 E4 CORE Load magnetic tape E4 NON-CORE Maintain magnetic tape drives E5 CORE Manage communication network systems security functions E5 CORE Manage shipboard bandwidth E4 CORE Monitor Automated Digital Network Systems (ADNS) E5 CORE Operate Automated Digital Network Systems (ADNS) E4 CORE Perform End of Mission Sanitizations (EOMS) E4 NON-CORE Process flight data E4 CORE Set Emission Control (EMCON) conditions E4 CORE Set up Automated Digital Network Systems (ADNS) E5 CORE Shift message system communication MESSAGE SYSTEM OPERATIONS E5 CORE Establish interconnectivity with Command, Control, Communications, Computers, and Information (C4I) systems E5 CORE Establish unit and command certificates E4 CORE Implement Key Management Infrastructure (KMI) system updates E5 CORE Implement non-repudiation controls E6 CORE Install certificates E5 CORE Manage Digital Media Distribution Systems (DMDS) E5 CORE Monitor message queues E5 CORE Monitor message systems E6 NON-CORE Prepare message system status reports E5 CORE Troubleshoot network cabling E5 CORE Validate unit and command certificates NETWORK ADMINISTRATION E5 CORE Manage computer Information System (IS) queues IT-12

13 Job Title IT-13 Job Code Information Technology Security Technician Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Computer and Mathematical TBD INFOR TECHNOLOGY SECURITY TEC IT SEC TEC Pay Plan Career Field Other Relationships and Rules: Enlisted IT NEC 2780 Job Description Information Technology Security Technicians monitor and protect network computer systems by detecting and reporting threats of network intrusion and unauthorized access; protect information from and recover information after loss or damage using backups, virus detection, and recovery software procedures; manage and validate network systems security using hardware, software, and established procedures; utilize Information Assurance (IA) and Computer Network Defense (CND) programs; and perform network accreditations and certifications. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General Computer Security Specialists Computer and Mathematical Skills Complex Problem Solving Critical Thinking Management of Material Resources Monitoring Operation and Control Operations Analysis Systems Analysis Systems Evaluation Technology and Design Writing Abilities Category Flexibility Control Precision Deductive Reasoning Finger Dexterity Inductive Reasoning Information Ordering Mathematical Reasoning Problem Sensitivity Written Comprehension Written Expression COMMUNICATIONS SECURITY E6 CORE Develop Information Systems Security (ISS) plans INFORMATION ASSURANCE E7 CORE Complete network security assessment checklists E7 CORE Develop Information Systems Security (ISS) policies E7 CORE Evaluate Information Systems Security (ISS) incidents E6 CORE Evaluate trusted computer security E5 CORE Identify and isolate malicious code E5 CORE Identify Information Systems Security (ISS) violations E5 CORE Identify Information Systems Security (ISS) vulnerabilities E7 CORE Identify security issues (protection, aggregation, inter-connectivity) E6 CORE Implement Information Assurance Vulnerability Alerts (IAVA) E6 CORE Implement Information Assurance Vulnerability Bulletins (IAVB) E7 CORE Implement Information Security (INFOSEC) incident reporting processes E7 CORE Implement Information Systems Security (ISS) policies E6 CORE Implement network firewalls E7 CORE Implement network security programs E7 CORE Implement security disciplines

14 E6 CORE Maintain Information Assurance Vulnerability Alerts (IAVA) messages E6 CORE Maintain Information Systems Security (ISS) certification and accreditation documentation E5 CORE Maintain Information Systems Security (ISS) logs E7 CORE Manage electronic spillage E6 CORE Manage Information Systems Security (ISS) documentation E7 CORE Manage Information Systems Security (ISS) programs E7 CORE Manage intranet security policies E6 CORE Monitor Information Systems Security (ISS) programs E5 CORE Remove system viruses E7 CORE Report Department of Defense (DoD) Information System (IS) compromises E7 CORE Report Department of the Navy (DoN) information security incidents E7 CORE Report Information Systems Security (ISS) incidents E7 CORE Review Information Systems Security (ISS) requirements E4 CORE Update computer Information System (IS) virus files E5 CORE Monitor message systems E5 CORE Configure virus scanners MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION E5 CORE Identify network security faults E5 CORE Implement River City conditions on computer Information Systems (IS) E7 CORE Manage audit data E5 CORE Manage computer Information System (IS) queues E5 CORE Operate administrative tools E5 CORE Perform file system maintenance E5 CORE Perform File Transfer Protocol (FTP) functions E6 CORE Verify security controls IT-14

15 Job Title Job Code Information Technology Communication Technician Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Installation, Maintenance, and Repair TBD INFOR TECHNOLOGY COMM TECH IT COM TEC Pay Plan Career Field Other Relationships and Rules: Enlisted IT NEC 2301, 2302, 2363, 2375, 2378, 9303, 9177 Job Description Information System Technicians perform core and specialty functions of communications operations, message processing, network administration and security; establish, monitor, and maintain Radio Frequency (RF) communications systems; perform spectrum management within an area of responsibility; handle, store, and retrieve incoming and outgoing messages; perform network system administration, maintenance and training; manage, plan and coordinate unit-level information systems security and integration across platforms, fleets and services; and ensure the proper security, distribution, handling, accounting, reporting, and control of Communications Security (COMSEC) materials, systems and equipment. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General Telecommunications Equipment Installation Installers and Repairers, Except Maintenance Line Installers and Repair Skills Abilities Complex Problem Solving Category Flexibility Critical Thinking Control Precision Equipment Selection Deductive Reasoning Management of Material Resources Finger Dexterity Monitoring Inductive Reasoning Operation and Control Information Ordering Systems Analysis Mathematical Reasoning Systems Evaluation Problem Sensitivity Troubleshooting Written Comprehension Writing Written Expression COMMUNICATIONS SYSTEM OPERATIONS E7 CORE Collect spectrum requirements E5 CORE Conduct communications checks E5 CORE Connect data links E6 CORE Designate circuit frequency assignments E7 NON-CORE Determine Joint restricted frequencies E4 CORE Determine system configuration requirements E6 CORE Develop Combat System Training Team (CSTT) scenarios E6 CORE Develop Communications Plans (COMPLANS) E7 CORE Develop communications policies E7 NON-CORE Develop Joint communications electronics operation instructions E7 NON-CORE Develop spectrum management plans E7 NON-CORE Develop spectrum requirements data call messages E7 NON-CORE Develop spectrum requirements summaries E7 NON-CORE Disseminate spectrum management plans E4 CORE Document communication reports E7 CORE Evaluate Radio Frequency (RF) communications policies IT-15

16 E7 NON-CORE Identify electromagnetic battlespace E7 CORE Implement communications plans E5 CORE Inspect terminal processors E5 CORE Investigate loss of Facilities Control (FACCON) E6 NON-CORE Issue frequency assignments E4 CORE Maintain communication publications E4 CORE Maintain communications status boards E5 CORE Maintain Radio Frequency (RF) circuit configuration files E5 CORE Monitor Extremely High Frequency (EHF) communications systems E4 CORE Monitor High Frequency (HF) communications systems E5 CORE Monitor International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E4 CORE Monitor Over-The-Air-Transmission (OTAT) operations E4 CORE Monitor portable communications systems E4 CORE Monitor Radio Frequency (RF) systems E4 CORE Monitor Super High Frequency (SHF) communications systems E4 CORE Monitor Ultra High Frequency (UHF) communications systems E4 CORE Monitor Very High Frequency (VHF) communications systems E5 CORE Operate Extremely High Frequency (EHF) communications systems E4 CORE Operate High Frequency (HF) communications systems E5 CORE Operate International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E4 CORE Operate portable communications systems E4 CORE Operate Secure Telephone Equipment (STE) E4 CORE Operate signal data converting Radio Frequency (RF) systems E4 CORE Operate Super High Frequency (SHF) communications systems E4 CORE Operate Ultra High Frequency (UHF) communications systems E4 CORE Operate Very High Frequency (VHF) communications systems E4 CORE Perform Automated Digital Network System (ADNS) backups E6 CORE Prepare Satellite Access Requests (SAR) E4 CORE Report high priority voice communications E6 NON-CORE Resolve electromagnetic interference E4 CORE Restore computer Information Systems (IS) E4 CORE Set up communications subsystems E5 CORE Set up High Frequency (HF) communications systems E5 CORE Set up International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E5 CORE Set up portable communications systems E5 CORE Set up Super High Frequency (SHF) communications systems IT-16

17 E5 CORE Set up telecommunications circuits for Hazards of Electromagnetic Radiation to Ordnance (HERO) E5 CORE Set up Very High Frequency (VHF) communications systems E5 CORE Set up Extremely High Frequency (EHF) communications systems E5 CORE Set up Ultra High Frequency (UHF) communications systems E5 CORE Troubleshoot advanced functions of Automated Digital Network Systems (ADNS) E5 CORE Troubleshoot Extremely High Frequency (EHF) communications systems E5 CORE Troubleshoot High Frequency (HF) communications systems E5 CORE Troubleshoot International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E4 CORE Troubleshoot portable communications systems E5 CORE Troubleshoot Super High Frequency (SHF) communications systems E5 CORE Troubleshoot Ultra High Frequency (UHF) communications systems E5 CORE Troubleshoot Very High Frequency (VHF) communications systems E5 CORE Update communications status boards E5 NON-CORE Update spectrum use databases E5 CORE Update trouble desk knowledge base E6 CORE Verify communications security policies E7 CORE Verify system certifications MESSAGE SYSTEM OPERATIONS E5 CORE Apply minimize condition procedures E7 CORE Complete communication certification checklists E4 CORE Destroy messages E4 CORE Download naval messages via automated systems E5 CORE Draft communications spot reports E5 CORE Establish connectivity with servicing communications center E4 CORE Maintain communications archives E4 CORE Maintain general message files E4 CORE Maintain local media and technical libraries E4 CORE Maintain message logs E5 CORE Manage operational communications messages E5 CORE Perform communications shifts E4 CORE Prepare messages for transmission E4 CORE Prepare special handling messages E5 CORE Respond to communications spot reports E4 CORE Respond to high precedence messages E4 CORE Respond to special handling messages IT-17

18 E4 CORE Sanitize communication center E5 CORE Set up message processing system E5 CORE Update communications shifts NETWORK ADMINISTRATION E5 CORE Develop computer Information System (IS) Standard Operating Procedures (SOP) E4 CORE Document customer trouble calls E6 CORE Document offsite technical support actions E5 CORE Operate computer Information Systems (IS) E5 CORE Respond to customer trouble calls IT-18

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63 CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63 Updated: July 2015 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN SUBMARINES (ITS) SCOPE OF RATING GENERAL INFORMATION INFORMATION

More information

CHAPTER 32 ELECTRONICS TECHNICIAN (ET) NAVPERS 18068-32J CH-64

CHAPTER 32 ELECTRONICS TECHNICIAN (ET) NAVPERS 18068-32J CH-64 CHAPTER 32 ELECTRONICS TECHNICIAN (ET) NAVPERS 18068-32J CH-64 Updated: October 2015 SCOPE OF RATING GENERAL INFORMATION ELECTRONICS COMMUNICATIONS TECHNICIAN AUXILIARY EQUIPMENT AND SUPPORT SYSTEMS TABLE

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

CHAPTER 43 INTERIOR COMMUNICATIONS ELECTRICIAN (IC) NAVPERS 18068-43E CH-64

CHAPTER 43 INTERIOR COMMUNICATIONS ELECTRICIAN (IC) NAVPERS 18068-43E CH-64 CHAPTER 43 INTERIOR COMMUNICATIONS ELECTRICIAN (IC) NAVPERS 18068-43E CH-64 Updated: October 2015 TABLE OF CONTENTS INTERIOR COMMUNICATIONS ELECTRICIAN (IC) SCOPE OF RATING GENERAL INFORMATION INTERIOR

More information

CHAPTER 2 AIR TRAFFIC CONTROLLER (AC) NAVPERS 18068-2F CH-64

CHAPTER 2 AIR TRAFFIC CONTROLLER (AC) NAVPERS 18068-2F CH-64 CHAPTER 2 AIR TRAFFIC CONTROLLER (AC) NAVPERS 18068-2F CH-64 Updated: October 2015 TABLE OF CONTENTS AIR TRAFFIC CONTROLLER (AC) SCOPE OF RATING GENERAL INFORMATION AIR TRAFFIC CONTROLLER CONTROL TOWER

More information

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT InternationalLabourOrganization OrganisationinternationaleduTravail OrganizaciónInternacionaldelTrabajo Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions:

More information

1. Provide hardware/software installation, updates, configuration, troubleshooting and resolution.

1. Provide hardware/software installation, updates, configuration, troubleshooting and resolution. When replying to this job posting please: Send your resume to [email protected] Subject Line: Response to 6252012PCT No phone calls at this time please Title: PC Technician Start Date: October 1, 2012

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Privacy + Security + Integrity

Privacy + Security + Integrity Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

Sample Career Ladder/Lattice for Information Technology

Sample Career Ladder/Lattice for Information Technology Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.

More information

CHAPTER 57 NAVY COUNSELOR (NC) NAVPERS 18068-57H CH-55

CHAPTER 57 NAVY COUNSELOR (NC) NAVPERS 18068-57H CH-55 CHAPTER 57 NAVY COUNSELOR (NC) NAVPERS 18068-57H CH-55 Updated: July 2013 TABLE OF CONTENTS NAVY COUNSELOR (RECRUITER) (NCR) SCOPE OF RATING GENERAL INFORMATION RECRUITING MANAGER APPLICANT PROCESSING

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Education and Awareness No: Effective: OSC-6 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78

SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78 SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78 AREA(S): DATA CENTER OPERATIONS POSITION SUMMARY: The Network Specialist s role is to install,

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

CLASS SPECIFICATION Systems Support Analyst II

CLASS SPECIFICATION Systems Support Analyst II San Diego Unified Port District Class Code: B211-UE03 CLASS SPECIFICATION Systems Support Analyst II FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented

More information

Network Technology (10101)

Network Technology (10101) Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use

More information

933 COMPUTER NETWORK/SERVER SECURITY POLICY

933 COMPUTER NETWORK/SERVER SECURITY POLICY 933 COMPUTER NETWORK/SERVER SECURITY POLICY 933.1 Overview. Indiana State University provides network services to a large number and variety of users faculty, staff, students, and external constituencies.

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008

DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008 DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

FUNCTIONAL AREA 12. Network Administration (NET)

FUNCTIONAL AREA 12. Network Administration (NET) FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber

More information

APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.

APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151. APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE TITLE O*NET-SOC CODE RAPIDS CODE Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.00 111HY Network and Computer

More information

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009 Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

DoDI 8500-2 IA Control Checklist - MAC 3-Public. Version 1, Release 1.4. 28 March 2008

DoDI 8500-2 IA Control Checklist - MAC 3-Public. Version 1, Release 1.4. 28 March 2008 DoDI 8500-2 IA Control Checklist - MAC 3-Public Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark each

More information

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above. ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033

DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 2 May 2016 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #16-051

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

DISASTER RECOVERY WITH AWS

DISASTER RECOVERY WITH AWS DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref: SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE NUMBER 8100.02 April 14, 2004 Certified Current as of April 23, 2007 ASD(NII) SUBJECT: Use of Commercial Wireless Devices, Services, and Technologies in the Department of

More information

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au [email protected]

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Managing and Maintaining a Windows Server 2003 Network Environment

Managing and Maintaining a Windows Server 2003 Network Environment Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

Ames Consolidated Information Technology Services (A-CITS) Statement of Work

Ames Consolidated Information Technology Services (A-CITS) Statement of Work Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

CLASS SPECIFICATION Systems Support Analyst I

CLASS SPECIFICATION Systems Support Analyst I San Diego Unified Port District Class Code: B837-UE03 CLASS SPECIFICATION Systems Support Analyst I FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

17 July 2015 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #15-084. POSITION: IT Specialist (CUSTSPT) (D0269000) (GS-2210-07/09) EXCEPTED POSITION

17 July 2015 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #15-084. POSITION: IT Specialist (CUSTSPT) (D0269000) (GS-2210-07/09) EXCEPTED POSITION DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Joint Force Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 17 July 2015 TECHNICIAN POSITION VACANCY ANNOUNCEMENT

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

Security in Space: Intelsat Information Assurance

Security in Space: Intelsat Information Assurance Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Get what s right for your business. Contact @lliance Technologies.

Get what s right for your business. Contact @lliance Technologies. Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer Technology: Your Need to Know

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer Technology: Your Need to Know Lecture Outline Computer Technology: Your Need to Know Objectives In this discussion, you will learn to: Describe the activities of information systems professionals Describe the technical knowledge of

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows

More information

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming

More information