CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63



Similar documents
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS F CH-48

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

CHAPTER 43 INTERIOR COMMUNICATIONS ELECTRICIAN (IC) NAVPERS E CH-64

CHAPTER 32 ELECTRONICS TECHNICIAN (ET) NAVPERS J CH-64

INFORMATION TECHNOLOGY ENGINEER V

CHAPTER 57 NAVY COUNSELOR (NC) NAVPERS H CH-55

CHAPTER 2 AIR TRAFFIC CONTROLLER (AC) NAVPERS F CH-64

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78

Supplier Security Assessment Questionnaire

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Sample Career Ladder/Lattice for Information Technology

1. Provide hardware/software installation, updates, configuration, troubleshooting and resolution.

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

How To Ensure The C.E.A.S.A

MCSA Security + Certification Program

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

IT Networking and Security

Network Technology (10101)

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Managing and Maintaining Windows Server 2008 Servers

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

IP Telephony Management

APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician)

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION

MSP Service Matrix. Servers

FUNCTIONAL AREA 12. Network Administration (NET)

Advanced Diploma In Hardware, Networking & Server Configuration

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Vendor Audit Questionnaire

DETAIL AUDIT PROGRAM Information Systems General Controls Review

Rotherham CCG Network Security Policy V2.0

Network Security Administrator

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

Microsoft Technologies

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

6445A - Implementing and Administering Small Business Server 2008

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Proactive IT Solutions More Reliable Networks Are Our Business

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IBX Business Network Platform Information Security Controls Document Classification [Public]

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Complete Managed Services. Proposal for managed services for the City of Tontitown

Data Center Colocation - SLA

Backup & Disaster Recovery Options

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Security in Space: Intelsat Information Assurance

NOS for Network Support (903)

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

C I T Y O F W E S T L I N N

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer Technology: Your Need to Know

PC Proactive Solutions Technical View

Client Security Risk Assessment Questionnaire

Managed IT Solutions. More Reliable Networks Are Our Business

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Module 7: System Component Failure Contingencies

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

Managing and Maintaining a Windows Server 2003 Network Environment

IT Networking and Security

Get what s right for your business. Technologies.

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Version: Page 1 of 5

Career and Technical Education Adapted CTE Course Blueprint of Essential Standards. Business, Finance, and Information Technology Education

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Network Technologies

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

6445A - Implementing and Administering Windows Small Business Server 2008

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

How To Write A Health Care Security Rule For A University

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

EaseUS Todo Backup PXE Server

HIPAA Security Matrix

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

CHAPTER 2: Staffing ROLES OF STAFF. Roles Required to Provide Tech Support

Managed Services. Business Intelligence Solutions

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

CompTIA Network+ (Exam N10-005)

JOB DESCRIPTION CONTRACTUAL POSITION

Remote Infrastructure Support Services & Managed IT Services

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Information Technology Solutions

Transcription:

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63 Updated: July 2015

TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN SUBMARINES (ITS) SCOPE OF RATING GENERAL INFORMATION INFORMATION TECHNOLOGY TECHNICIAN SUBMARINES INFORMATION ASSURANCE NETWORK ADMINISTRATION NETWORK MANAGEMENT NETWORK OPERATIONS INFORMATION TECHNOLOGY MANAGER SUBMARINES INFORMATION ASSURANCE NETWORK ADMINISTRATION NETWORK MANAGEMENT NETWORK OPERATIONS ITS-3 ITS-4 ITS-5 ITS-5 ITS-6 ITS-6 ITS-7 ITS-9 ITS-9 ITS-10 ITS-10 ITS-10 ITS-2

NAVY ENLISTED OCCUPATIONAL STANDARDS FOR INFORMATION SYSTEMS TECHNICIAN SUBMARINES (ITS) SCOPE OF RATING Information System Technician Submarines (ITS) perform core and specialty functions of network system administration, maintenance, security, and training; and plan, coordinate, and manage unit-level Information Systems (IS) security and integration across platforms, fleets, and services. These Occupational Standards are to be incorporated in Volume I, Part B, of the Manual of Navy Enlisted Manpower and Personnel Classifications and Occupational Standards (NAVPERS 18068F) as Chapter 67. ITS-3

GENERAL INFORMATION CAREER PATTERN ITSCM ITSCS ITSC ITS1 ITS2 ITS3 SEAMAN APPRENTICESHIP Normal path of advancement to Chief Warrant Officer and Limited Duty Officer categories can be found in OPNAVINST 1420.1. For rating entry requirements, refer to MILPERSMAN 1306-618. SAFETY The observance of Operational Risk Management (ORM) and proper safety precautions in all areas is an integral part of each billet and the responsibility of every Sailor; therefore, it is a universal requirement for all ratings. ITS-4

Job Title Job Code Information Technology Technician Submarines 002712 Job Family NOC Short Title (30 Characters) Short Title (14 Characters) Computer and Mathematical TBD IT TECHNICIAN SUBMARINES IT TECH SUBS Pay Plan Career Field Other Relationships and Rules Enlisted ITS N/A Job Description Information Technology Technicians Submarines perform core and specialty functions of network administration; troubleshoot and assist with the use of computer hardware and software including printers, and software applications; conduct system backups and restores; install applications and peripherals; monitor and protect network computer systems by detecting and reporting threats of network intrusion and unauthorized access; protect information from and recover information after loss or damage using backups, virus detection, and recovery software procedures; utilize Information Assurance (IA) and Computer Network Defense (CND) programs; and perform network accreditations and certifications. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General 115000 Network and Computer Systems 15-1071.00 Computer and Mathematical Administrators Skills Operation and Control Equipment Maintenance Systems Analysis Technology Design Writing Repairing Complex Problem Solving Troubleshooting Installation Reading Comprehension Abilities Information Ordering Written Comprehension Deductive Reasoning Problem Sensitivity Inductive Reasoning Written Expression Control Precision Manual Dexterity Flexibility of Closure Oral Expression INFORMATION ASSURANCE E5 CORE Maintain Information Systems Security (ISS) logs E5 CORE Process Information Assurance Vulnerability Bulletins (IAVB), Information Assurance Vulnerability Alerts (IAVA), and Information Assurance Vulnerability Technical (IAVT) advisories E7 CORE Report Information Security (INFOSEC) compliance E4 CORE Report Information Systems Security (ISS) incidents E4 CORE Report Information Systems Security (ISS) violations E4 CORE Report Information Systems Security (ISS) vulnerabilities E5 CORE Verify client platform hardware and software securities E6 CORE Verify trusted computer security status ITS-5

NETWORK ADMINISTRATION E4 CORE Administer computer Information System (IS) user accounts E4 CORE Administer domain system accounts E4 CORE Analyze network audit logs E4 CORE Apply updates to local media and technical libraries E4 CORE Back up Information Systems (IS) E4 CORE Maintain computer Information System (IS) components E5 CORE Maintain computer Information System (IS) servers E5 CORE Maintain intranet websites E4 CORE Maintain network components E5 CORE Maintain network databases E4 CORE Maintain network printers E4 CORE Maintain Program of Record (POR) applications (e.g. Electronic Shift Operations Management System (ESOMS), Web Advanced Technical Information Support System (WeBATIS), etc.) E4 CORE Maintain system hardware E5 CORE Maintain Virtual Private Networks (VPN) E5 CORE Perform Information System (IS) trend analyses (e.g. hardware, software, network, etc.) E5 CORE Perform disk administration E5 CORE Perform system file maintenance E6 CORE Process Program of Record (POR) system updates E6 CORE Update computer configuration documentation E4 CORE Update computer Information System (IS) virus files E4 CORE Analyze audit logs NETWORK MANAGEMENT E5 CORE Apply router Access Control Lists (ACL) E6 CORE Audit network firewalls E6 CORE Configure domain backup schedules E6 CORE Document off-site technical support actions E7 CORE Formulate system life cycle support plans E4 CORE Inventory computer Information System (IS) assets E4 CORE Maintain computer Information System (IS) logs E7 CORE Maintain network documentation ITS-6

E5 CORE Manage Information Systems (IS) file and folder access E7 CORE Manage Information Systems (IS) programs (e.g. Submarine Local Area Network (SUBLAN), Host Based Security System (HBSS), Navy Information/Application Product Suite (NI/APS), Naval Tactical Command Support System (NTCSS)) E6 CORE Manage network databases E7 CORE Plan network restorations E4 CORE Prepare network status reports E4 CORE Update trouble desk knowledge database E6 CORE Verify network firewall configurations E4 CORE Verify system configuration requirements NETWORK OPERATIONS E4 CORE Configure external peripherals E6 CORE Configure group policy objects E4 CORE Configure Information Systems (IS) application software E4 CORE Configure Information Systems (IS) network hardware E4 CORE Configure Local Area Network (LAN) architecture E5 CORE Configure network auditing logs E5 CORE Configure network software E4 CORE Configure print services E5 CORE Configure server Operating System (OS) software E5 CORE Configure virus scanners E4 CORE Configure workstation internal core components E4 CORE Configure workstation network connectivity E4 CORE Configure workstation Operating System (OS) software E4 CORE Construct networks E4 CORE Create workstation images E4 CORE Document customer trouble calls E5 CORE Document network outage E4 CORE Document server Operating System (OS) errors E5 CORE Document server outages E4 CORE Install external peripherals E5 CORE Install network components E4 CORE Install network peripherals E4 CORE Install network software E4 CORE Install Operating Systems (OS) E6 CORE Install Remote Access Servers (RAS) E4 CORE Install storage devices (e.g. Redundant Array of Inexpensive Disks (RAID) array, Hard Disk Drives (HDD), etc.) E4 CORE Install workstation internal core components E4 CORE Load image software ITS-7

E4 CORE Perform corrective action for trouble calls E4 CORE Perform file transfer protocols (e.g. Trivial File Transfer Protocol (TFTP), Secure Shell Protocol (SSP), etc.) E4 CORE Repair client platforms E4 CORE Restore computer Information Systems (IS) E5 CORE Set up Channel Service Units/Data Service Units (CSU/DSU) for Fiber Distributed Data Interface (FDDI) operations E4 CORE Shut down computer Information Systems (IS) E4 CORE Start up computer Information Systems (IS) E4 CORE Start up network servers E4 CORE Troubleshoot client platforms E5 CORE Troubleshoot computer Information Systems (IS) E4 CORE Troubleshoot external peripherals E4 CORE Troubleshoot file and folder access problems E5 CORE Troubleshoot intranet websites E5 CORE Troubleshoot network components E6 CORE Troubleshoot network databases E4 CORE Troubleshoot networks E4 CORE Troubleshoot Operating Systems (OS) E5 CORE Troubleshoot Program of Record (POR) applications (e.g. Electronic Shift Operations Management System (ESOMS), Web Advanced Technical Information Support System (WeBATIS), etc.) E5 CORE Troubleshoot server internal core components E5 CORE Troubleshoot storage devices (e.g. Redundant Array of Inexpensive Disks (RAID) array, Hard Disk Drives (HDD), etc.) E5 CORE Troubleshoot system hardware E4 CORE Troubleshoot workstation application software E4 CORE Troubleshoot workstation internal core components E4 CORE Troubleshoot workstation network connectivity E5 CORE Verify delivered Information Systems (IS) functionality E5 CORE Verify delivered network components functionality E5 CORE Verify delivered system hardware functionality ITS-8

Job Title Job Code Information Technology Manager Submarines 002713 Job Family NOC Short Title (30 Characters) Short Title (14 Characters) Computer and Mathematical TBD IT MANAGER SUBMARINES IT MGR SUBS Pay Plan Career Field Other Relationships and Rules Enlisted ITS N/A Job Description Information Technology Managers Submarines plan, coordinate, and manage unit-level Information Systems Security (ISS) and integration across platforms, fleets, and services; approve policies for and direct Information Assurance (IA) programs; manage and implement Information Systems Security (ISS) countermeasures and network security programs; develop and review Information Systems Security (ISS) accreditation packages; design, plan, and prepare for network expansions and upgrades; manage administrative functions and security procedures governing the special security program; and coordinate the allocation of personnel and financial resources, protection of classified information, and the training of Information Technology Technicians Submarines. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General 115000 Network and Computer Systems 15-1142.00 Computer and Mathematical Administrators Skills Operation and Control Writing Critical Thinking Systems Evaluation Complex Problem Solving Coordination Reading Comprehension Equipment Maintenance Quality Control Analysis Technology Design Abilities Information Ordering Deductive Reasoning Written Comprehension Problem Sensitivity Inductive Reasoning Written Expression Flexibility of Closure Category Flexibility Originality Control Precision INFORMATION ASSURANCE E7 CORE Analyze Information Systems Security (ISS) requirements E7 CORE Approve Information Systems Security (ISS) directives (e.g. policies, plans, instructions, Standard Operating Procedures (SOP), etc.) E7 CORE Evaluate Information Systems Security (ISS) incidents E7 CORE Evaluate Information Systems Security (ISS) violations E7 CORE Evaluate Information Systems Security (ISS) vulnerabilities E7 CORE Maintain Information Systems Security (ISS) certification and accreditation documentation E7 CORE Manage electronic spillage response operations E7 CORE Manage Information Security (INFOSEC) incident reporting processes E7 CORE Manage Information Security Systems (ISS) programs (e.g. Host Based Security System (HBSS), etc.) E6 CORE Monitor Information Systems Security (ISS) software programs E7 CORE Report Information Security (INFOSEC) compliance E6 CORE Verify Information System (IS) security controls E6 CORE Verify trusted computer security status ITS-9

NETWORK ADMINISTRATION E4 CORE Analyze network audit logs E7 CORE Approve Information Systems (IS) policies (e.g. Information Security System (ISS), Host Based Security System (HBSS), etc.) E5 CORE Maintain Virtual Private Networks (VPN) E5 CORE Perform Information System (IS) trend analyses (e.g. hardware, software, network, etc.) E6 CORE Prepare system security certification and accreditation documentation packages E4 CORE Analyze audit logs NETWORK MANAGEMENT E5 CORE Apply router Access Control Lists (ACL) E6 CORE Audit network firewalls E7 CORE Coordinate catastrophic disaster recovery with off-site technicians E6 CORE Coordinate network migration and installation requirements with outside organizations E5 CORE Design intranet websites E6 CORE Document network migration and installation risks E6 CORE Document off-site technical support actions E6 CORE Draft Information Systems Security (ISS) directives (e.g. policies, plans, instructions, Standard Operating Procedures (SOP), etc.) E7 CORE Draft network topology plans E7 CORE Formulate system life cycle support plans E7 CORE Maintain network documentation E5 CORE Manage Information Systems (IS) file and folder access E7 CORE Manage Information Systems (IS) programs (e.g. Submarine Local Area Network (SUBLAN), Host Based Security System (HBSS), Navy Information/Application Product Suite (NI/APS), Naval Tactical Command Support System (NTCSS)) E7 CORE Manage Local Area Network (LAN) architecture configurations E6 CORE Manage network databases E7 CORE Plan network restorations E7 CORE Prepare disaster recovery contingency plans E6 CORE Verify network firewall configurations NETWORK OPERATIONS E6 CORE Configure group policy objects E6 CORE Install Remote Access Servers (RAS) E6 CORE Troubleshoot network databases E5 CORE Verify delivered Information Systems (IS) functionality E5 CORE Verify delivered network components functionality E5 CORE Verify delivered system hardware functionality ITS-10