CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67F CH-48



Similar documents
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS H CH-63

CHAPTER 32 ELECTRONICS TECHNICIAN (ET) NAVPERS J CH-64

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

CHAPTER 43 INTERIOR COMMUNICATIONS ELECTRICIAN (IC) NAVPERS E CH-64

CHAPTER 2 AIR TRAFFIC CONTROLLER (AC) NAVPERS F CH-64

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

1. Provide hardware/software installation, updates, configuration, troubleshooting and resolution.

INFORMATION TECHNOLOGY ENGINEER V

Privacy + Security + Integrity

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Sample Career Ladder/Lattice for Information Technology

CHAPTER 57 NAVY COUNSELOR (NC) NAVPERS H CH-55

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Ohio Supercomputer Center

SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78

Network Security Administrator

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

Supplier Security Assessment Questionnaire

CLASS SPECIFICATION Systems Support Analyst II

Network Technology (10101)

933 COMPUTER NETWORK/SERVER SECURITY POLICY

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

Security Policy JUNE 1, SalesNOW. Security Policy v v

How To Ensure The C.E.A.S.A

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

IBX Business Network Platform Information Security Controls Document Classification [Public]

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

15 Organisation/ICT/02/01/15 Back- up

DoDI IA Control Checklist - MAC 2-Sensitive. Version 1, Release March 2008

Data Management Policies. Sage ERP Online

Rotherham CCG Network Security Policy V2.0

FUNCTIONAL AREA 12. Network Administration (NET)

APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician)

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

HIPAA Security COMPLIANCE Checklist For Employers

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

DoDI IA Control Checklist - MAC 3-Public. Version 1, Release March 2008

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

MSP Service Matrix. Servers

DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Headquarters, Maine National Guard Camp Keyes, Augusta, Maine

HIPAA Security Alert

DISASTER RECOVERY WITH AWS

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Managing and Maintaining Windows Server 2008 Servers

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Information Resources Security Guidelines

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Ohio Supercomputer Center

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Newcastle University Information Security Procedures Version 3

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Office of Inspector General

Information Technology Solutions

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

Department of Defense

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Information Security Policies. Version 6.1

Managed Services. Business Intelligence Solutions

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Ohio Supercomputer Center

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Managing and Maintaining a Windows Server 2003 Network Environment

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Ames Consolidated Information Technology Services (A-CITS) Statement of Work

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

CLASS SPECIFICATION Systems Support Analyst I

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

Exhibit to Data Center Services Service Component Provider Master Services Agreement

17 July 2015 TECHNICIAN POSITION VACANCY ANNOUNCEMENT # POSITION: IT Specialist (CUSTSPT) (D ) (GS /09) EXCEPTED POSITION

Associate in Science Degree in Computer Network Systems Engineering

Security in Space: Intelsat Information Assurance

Draft Information Technology Policy

Get what s right for your business. Technologies.

Certified Information Systems Auditor (CISA)

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer Technology: Your Need to Know

INCIDENT RESPONSE CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Transcription:

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67F CH-48 Updated: October 2011

TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN (IT) SCOPE OF RATING GENERAL INFORMATION INFORMATION TECHNOLOGY NETWORK TECHNICIAN COMMUNICATIONS SECURITY INFORMATION ASSURANCE NETWORK ADMINISTRATION NETWORK MANAGEMENT NETWORK SYSTEM OPERATIONS INFORMATION TECHNOLOGY SECURITY MANAGER COMMUNICATIONS SECURITY COMMUNICATIONS SYSTEM OPERATIONS MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION INFORMATION TECHNOLOGY SECURITY TECHNICIAN COMMUNICATIONS SECURITY INFORMATION ASSURANCE MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION INFORMATION TECHNOLOGY COMMUNICATION TECHNICIAN COMMUNICATIONS SYSTEM OPERATIONS MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION IT-3 IT-4 IT-5 IT-5 IT-5 IT-5 IT-7 IT-7 IT-9 IT-9 IT-11 IT-12 IT-12 IT-13 IT-13 IT-13 IT-14 IT-14 IT-15 IT-15 IT-17 IT-18 IT-2

NAVY ENLISTED OCCUPATIONAL STANDARDS FOR INFORMATION SYSTEMS TECHNICIAN (IT) SCOPE OF RATING Information System Technicians perform core and specialty functions of communications operations, message processing, and network administration and security; establish, monitor, and maintain Radio Frequency (RF) communications systems; perform spectrum management within an area of responsibility; handle, store, and retrieve incoming and outgoing messages; perform network system administration, maintenance and training; manage, plan and coordinate unit-level information systems security and integration across platforms, fleets, and services; and ensure the proper security, distribution, handling, accounting, reporting, and control of Communications Security (COMSEC) materials, systems, and equipment. These Occupational Standards are to be incorporated in Volume I, Part B, of the Manual of Navy Enlisted Manpower and Personnel Classifications and Occupational Standards (NAVPERS 18068F) as Chapter 67. IT-3

GENERAL INFORMATION CAREER PATTERN ITCM ITCS ITC IT1 IT2 IT3 SEAMAN APPRENTICESHIP Normal path of advancement to Chief Warrant Officer and Limited Duty Officer categories can be found in OPNAVINST 1420.1. For rating entry requirements, refer to MILPERSMAN 1306-618. SAFETY The observance of Operational Risk Management (ORM) and proper safety precautions in all areas is an integral part of each billet and the responsibility of every Sailor; therefore, it is a universal requirement for all ratings. IT-4

Job Title Job Code Information Technology Network Technician 001414 Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Management TBD INFOR TECHNOLOGY NETWORK TECH IT NET TEC Pay Plan Career Field Other Relationships and Rules: Enlisted IT NEC 2709, 2710, 2720, 2730, 2735, 2777, 2778 Job Description Information Technology Network Technicians perform core and specialty functions of network administration; install applications and peripherals, troubleshoot user problems, and provide assistance with the use of computer hardware and software including printers, wordprocessors, electronic mail systems, and operating systems; conduct system backups and restores; utilize knowledge of database management systems to maintain, administer, test, and implement computer databases; and work with General Service (GENSER), unclassified, and Special Intelligence (SI) systems including Global Command and Control System-Maritime (GCCS-M), Navy Tactical Command Support Systems (NTCSS), Tactical Support Center (TSC) data processing systems, Integrated Bridge Systems (IBS), Integrated Communications and Advanced Networks (ICAN), Shipboard Wide-Area-Networks (SWAN), and ship s control or engineering systems. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General 115000 Computer and Information 11-3021.00 Management Systems Managers Skills Critical Thinking Installation Management of Material Resources Monitoring Operation and Control Repairing Systems Analysis Technology and Design Troubleshooting Writing Abilities Category Flexibility Control Precision Deductive Reasoning Inductive Reasoning Information Ordering Mathematical Reasoning Oral Expression Problem Sensitivity Written Comprehension Written Expression COMMUNICATIONS SECURITY E4 CORE Distribute Communication Security (COMSEC) Material E6 CORE Issue Electronic Key Management System (EKMS) materials to local elements E6 CORE Transfer custody of Electronic Key Management System (EKMS) material INFORMATION ASSURANCE E7 CORE Manage Information Assurance (IA) workforce Information Professional (IP) programs E6 CORE Manage Information Assurance (IA) workforce Information Professional (IP) training programs NETWORK ADMINISTRATION E5 CORE Administer computer Information System (IS) user accounts E5 CORE Analyze audit logs E4 CORE Back up computer Information Systems (IS) E5 CORE Back-up network systems E4 CORE Configure computer application software IT-5

E4 CORE Configure external peripherals E6 CORE Configure network auditing logs E5 CORE Configure network hardware E5 CORE Configure network software E5 CORE Configure print services E5 CORE Configure server operating system software E4 CORE Configure workstation network connectivity E4 CORE Configure workstation Operating System (OS) software E7 CORE Construct networks E5 CORE Document network outages E5 CORE Document Operating System (OS) errors E5 CORE Document server outages E5 CORE Implement router Access Control Lists (ACL) E5 CORE Initialize network servers E4 CORE Install external peripherals E5 CORE Install network components E5 CORE Install network peripherals E5 CORE Install network software E5 CORE Install Operating Systems (OS) E5 CORE Maintain computer Information System (IS) servers E5 CORE Maintain network printers E5 CORE Manage computer Information System (IS) servers E5 CORE Manage file and folder accesses E6 CORE Manage network documentation E6 CORE Manage network system configurations E6 CORE Manage network system updates E4 CORE Monitor audit logs E5 CORE Monitor network equipment E5 CORE Monitor network software E5 CORE Monitor network systems E5 CORE Perform disk administration E6 CORE Perform trend analysis (hardware, software, or network) E7 CORE Plan network restorations E6 CORE Prepare network status reports E4 CORE Scan for viruses E5 CORE Shut down computer Information Systems (IS) E5 CORE Start up computer Information Systems (IS) IT-6

E5 CORE Test computer Information Systems (IS) E4 CORE Troubleshoot external peripherals E5 CORE Troubleshoot file and folder access problems E5 CORE Troubleshoot network hardware E5 CORE Troubleshoot Operating Systems (OS) E5 CORE Troubleshoot primary storage devices E4 CORE Troubleshoot workstation application software E4 CORE Troubleshoot workstation network connectivity E6 CORE Update computer configuration documentation NETWORK MANAGEMENT E6 CORE Configure domain system policies E7 CORE Configure Local Area Network (LAN) architecture E6 CORE Determine computer software for migration or installation E6 CORE Determine network migration and installation potential problems E6 CORE Determine network migrations and installation time requirements E6 CORE Determine network upgrade equipment E7 CORE Develop disaster recovery contingency plans E7 CORE Develop network plans E7 CORE Develop network policies E7 CORE Develop system life cycle plans E7 NON-CORE Estimate network migration or installation costs E7 CORE Implement Automated Information Systems (AIS) equipment and media disposition requirements E7 CORE Implement network policies E6 CORE Manage network system databases E6 CORE Manage networking solutions NETWORK SYSTEM OPERATIONS E5 CORE Administer accounts for domains E4 CORE Configure workstation internal core components E6 CORE Coordinate domain backup schedules E6 CORE Design network system databases E6 CORE Design web pages E5 CORE Identify Information Systems Security (ISS) incidents E7 CORE Implement new operating procedures for network users E6 CORE Inspect computer Information System (IS) components IT-7

E6 CORE Inspect network components E6 CORE Inspect system hardware E4 CORE Install primary storage devices E6 CORE Install Remote Access Servers (RAS) E4 CORE Install workstation internal core components E4 CORE Inventory computer Information System (IS) assets E4 CORE Maintain computer Information System (IS) logs E5 CORE Maintain network system databases E6 CORE Maintain software application scripts E5 CORE Maintain websites E5 CORE Manage Automated Data Processing (ADP) software E5 CORE Monitor customer trouble calls E5 CORE Troubleshoot Integrated Shipboard Network Systems (ISNS) E5 CORE Troubleshoot networks E5 CORE Troubleshoot server internal core components E4 CORE Troubleshoot workstation internal core components E6 CORE Write software application scripts IT-8

Job Title IT-9 Job Code Information Technology Security Manager 001422 Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Computer and Mathematical TBD INFOR TECHNOLOGY SECURITY MGR IT SEC MGR Pay Plan Career Field Proficiency Level Other Relationships and Rules: Enlisted IT J/M NEC 2779, 2781 Job Description Information Technology Security Managers plan, coordinate, and manage unit-level information systems security and integration across platforms, fleets, and services; direct Information Assurance (IA) programs and manage and implement information systems security countermeasures and network security programs; ensure the proper security, distribution, handling, accounting, reporting, and control of Communications Security (COMSEC) and Key Management Infrastructure (KMI) materials, systems, and equipment; develop and review Information Systems Security (ISS) accreditation packages; design, plan and prepare for network expansions and upgrades; prepare and review the checklist for Sensitive Compartmented Information Facility (SCIF) accreditation and periodic inspection; manage administrative functions and security procedures governing the special security program; and coordinate the allocation of personnel and financial resources, protection of classified information, and the training of Information Technology Specialists. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General 115000 Computer Security Specialists 15-1071.01 Computer and Mathematical Skills Coordination Critical Thinking Equipment Selection Management of Material Resources Management of Personnel Resources Operation and Control Operation Monitoring Quality Control Analysis Technology and Design Writing Abilities Category Flexibility Control Precision Deductive Reasoning Inductive Reasoning Information Ordering Oral Expression Problem Sensitivity Selective Attention Written Comprehension Written Expression COMMUNICATIONS SECURITY E6 CORE Administer access to symmetric Crypto Net E6 CORE Administer client platforms E4 CORE Administer deployed cryptologic tactical systems E6 CORE Administer High Assurance Platform (HAP) E6 CORE Administer High Assurance Platform (HAP) securities E6 CORE Administer Key Management Infrastructure (KMI) Operating Accounts (KOA) E6 CORE Administer Key Management Infrastructure (KMI) user accounts E6 CORE Administer the client platform securities E6 CORE Administer token security E6 CORE Assign product requestors E6 CORE Audit Key Management Infrastructure (KMI) management data E6 CORE Back up Key Management Infrastructure (KMI) accounts E7 CORE Brief communications security roles, responsibilities, obligations, and liabilities E7 CORE Configure Key Processors (KPs) E6 CORE Deregister Key Management Infrastructure (KMI) devices E6 CORE Destroy Communication Security (COMSEC) material

E6 CORE Destroy Key Management Infrastructure (KMI) products E6 CORE Develop Emergency Action Plans (EAP) E6 CORE Develop local Communications Security (COMSEC) handling instructions E6 CORE Develop network security instructions E6 CORE Develop system security certification and accreditation documentation E4 CORE Distribute Communications Security (COMSEC) material E6 CORE Endorse Key Management Infrastructure (KMI) Adware device to make key operational E6 CORE Endorse Key Management Infrastructure (KMI) devices E6 CORE Establish Key Management Infrastructure (KMI) new product requirements E6 CORE Generate Key Management Infrastructure (KMI) local electronic keys E6 CORE Generate Key Management Infrastructure (KMI) cryptologic product requests E6 CORE Generate local keys E6 CORE Identify Electronic Key Management System (EKMS) discrepancies E7 CORE Implement Communications Security (COMSEC) changes E7 CORE Implement Emergency Action Plans (EAP) E6 CORE Initialize access to asymmetric cryptologic network E6 CORE Initialize Key Management Infrastructure (KMI) devices E6 CORE Inspect security containers E6 CORE Install Key Management Infrastructure (KMI) system software E4 CORE Inventory Electronic Key Management System (EKMS) E6 CORE Issue Electronic Key Management System (EKMS) materials to local elements E6 CORE Issue Electronic Key Management System (EKMS) materials to users E6 CORE Issue Key Management Infrastructure (KMI) materials E5 CORE Maintain cryptographic equipment E6 CORE Maintain Electronic Key Management System (EKMS) databases E6 CORE Maintain Key Management Infrastructure (KMI) databases E6 CORE Maintain Key Management Infrastructure (KMI) equipment E4 CORE Maintain physical security of Secure Compartmental Information (SCI) computer Information Systems (IS) E6 CORE Manage access security controls E5 CORE Manage Crypto Ignition Keys (CIK) E6 CORE Manage Electronic Key Management System (EKMS) training programs E6 CORE Manage Key Management Infrastructure (KMI) Device Distribution Profiles (DDP) E4 CORE Manage Key Management Infrastructure (KMI) network connectivity E4 CORE Manage Key Management Infrastructure (KMI) production E6 CORE Manage Key Management Infrastructure (KMI) system configuration E6 CORE Manage Key Management Infrastructure (KMI) system reports IT-10

E6 CORE Manage tokens E6 CORE Monitor Key Management Infrastructure (KMI) platform security E6 CORE Order asymmetric products E6 CORE Order physical keying material E6 CORE Perform personalization of type 1 tokens E6 CORE Prepare local holder Electronic Key Management System (EKMS) reports E6 CORE Receive electronic Communications Security (COMSEC) material E4 CORE Receive electronic keying material via Over-the-Air-Transfers (OTAT) and Over- The-Air (OTAR) Rekeys E4 CORE Receive physical Communication Security (COMSEC) material E6 CORE Register Electronic Key Management System (EKMS) users E6 CORE Register Key Management Infrastructure (KMI) Operating Account (KOA) agents E7 CORE Register Key Management Infrastructure (KMI) users E6 CORE Register local Electronic Key Management System (EKMS) elements E6 CORE Relocate Key Management Infrastructure (KMI) accounts E7 CORE Report Communications Security (COMSEC) compliance E4 CORE Report Electronic Key Management System (EKMS) discrepancies E7 CORE Report Information Security (INFOSEC) compliance E6 CORE Report Key Management Infrastructure (KMI) violations E6 CORE Review Key Management Infrastructure (KMI) databases E4 CORE Safeguard classified material E4 CORE Set up cryptographic equipment E6 CORE Set up cryptographic networks E6 CORE Transfer custody of Electronic Key Management System (EKMS) material E6 CORE Transfer custody of Key Management Infrastructure (KMI) materials E6 CORE Update Device Distribution Profiles (DDP) E6 CORE Verify cryptographic equipment settings COMMUNICATIONS SYSTEM OPERATIONS E5 CORE Configure functions of Automated Digital Network Systems (ADNS) E4 NON-CORE Configure magnetic tape drives E4 NON-CORE Coordinate flight and squadron media E5 CORE Coordinate restoral with off site technician E5 CORE Disconnect data links E4 NON-CORE Initialize magnetic tapes drives E4 CORE Install electronic Communication Plans (COMPLAN) E4 CORE Load image software IT-11

E4 CORE Load magnetic tape E4 NON-CORE Maintain magnetic tape drives E5 CORE Manage communication network systems security functions E5 CORE Manage shipboard bandwidth E4 CORE Monitor Automated Digital Network Systems (ADNS) E5 CORE Operate Automated Digital Network Systems (ADNS) E4 CORE Perform End of Mission Sanitizations (EOMS) E4 NON-CORE Process flight data E4 CORE Set Emission Control (EMCON) conditions E4 CORE Set up Automated Digital Network Systems (ADNS) E5 CORE Shift message system communication MESSAGE SYSTEM OPERATIONS E5 CORE Establish interconnectivity with Command, Control, Communications, Computers, and Information (C4I) systems E5 CORE Establish unit and command certificates E4 CORE Implement Key Management Infrastructure (KMI) system updates E5 CORE Implement non-repudiation controls E6 CORE Install certificates E5 CORE Manage Digital Media Distribution Systems (DMDS) E5 CORE Monitor message queues E5 CORE Monitor message systems E6 NON-CORE Prepare message system status reports E5 CORE Troubleshoot network cabling E5 CORE Validate unit and command certificates NETWORK ADMINISTRATION E5 CORE Manage computer Information System (IS) queues IT-12

Job Title IT-13 Job Code Information Technology Security Technician 001427 Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Computer and Mathematical TBD INFOR TECHNOLOGY SECURITY TEC IT SEC TEC Pay Plan Career Field Other Relationships and Rules: Enlisted IT NEC 2780 Job Description Information Technology Security Technicians monitor and protect network computer systems by detecting and reporting threats of network intrusion and unauthorized access; protect information from and recover information after loss or damage using backups, virus detection, and recovery software procedures; manage and validate network systems security using hardware, software, and established procedures; utilize Information Assurance (IA) and Computer Network Defense (CND) programs; and perform network accreditations and certifications. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General 115000 Computer Security Specialists 15-1071.01 Computer and Mathematical Skills Complex Problem Solving Critical Thinking Management of Material Resources Monitoring Operation and Control Operations Analysis Systems Analysis Systems Evaluation Technology and Design Writing Abilities Category Flexibility Control Precision Deductive Reasoning Finger Dexterity Inductive Reasoning Information Ordering Mathematical Reasoning Problem Sensitivity Written Comprehension Written Expression COMMUNICATIONS SECURITY E6 CORE Develop Information Systems Security (ISS) plans INFORMATION ASSURANCE E7 CORE Complete network security assessment checklists E7 CORE Develop Information Systems Security (ISS) policies E7 CORE Evaluate Information Systems Security (ISS) incidents E6 CORE Evaluate trusted computer security E5 CORE Identify and isolate malicious code E5 CORE Identify Information Systems Security (ISS) violations E5 CORE Identify Information Systems Security (ISS) vulnerabilities E7 CORE Identify security issues (protection, aggregation, inter-connectivity) E6 CORE Implement Information Assurance Vulnerability Alerts (IAVA) E6 CORE Implement Information Assurance Vulnerability Bulletins (IAVB) E7 CORE Implement Information Security (INFOSEC) incident reporting processes E7 CORE Implement Information Systems Security (ISS) policies E6 CORE Implement network firewalls E7 CORE Implement network security programs E7 CORE Implement security disciplines

E6 CORE Maintain Information Assurance Vulnerability Alerts (IAVA) messages E6 CORE Maintain Information Systems Security (ISS) certification and accreditation documentation E5 CORE Maintain Information Systems Security (ISS) logs E7 CORE Manage electronic spillage E6 CORE Manage Information Systems Security (ISS) documentation E7 CORE Manage Information Systems Security (ISS) programs E7 CORE Manage intranet security policies E6 CORE Monitor Information Systems Security (ISS) programs E5 CORE Remove system viruses E7 CORE Report Department of Defense (DoD) Information System (IS) compromises E7 CORE Report Department of the Navy (DoN) information security incidents E7 CORE Report Information Systems Security (ISS) incidents E7 CORE Review Information Systems Security (ISS) requirements E4 CORE Update computer Information System (IS) virus files E5 CORE Monitor message systems E5 CORE Configure virus scanners MESSAGE SYSTEM OPERATIONS NETWORK ADMINISTRATION E5 CORE Identify network security faults E5 CORE Implement River City conditions on computer Information Systems (IS) E7 CORE Manage audit data E5 CORE Manage computer Information System (IS) queues E5 CORE Operate administrative tools E5 CORE Perform file system maintenance E5 CORE Perform File Transfer Protocol (FTP) functions E6 CORE Verify security controls IT-14

Job Title Job Code Information Technology Communication Technician 001432 Job Family NOC Short Title (30 Characters) Short Title (10 Characters) Installation, Maintenance, and Repair TBD INFOR TECHNOLOGY COMM TECH IT COM TEC Pay Plan Career Field Other Relationships and Rules: Enlisted IT NEC 2301, 2302, 2363, 2375, 2378, 9303, 9177 Job Description Information System Technicians perform core and specialty functions of communications operations, message processing, network administration and security; establish, monitor, and maintain Radio Frequency (RF) communications systems; perform spectrum management within an area of responsibility; handle, store, and retrieve incoming and outgoing messages; perform network system administration, maintenance and training; manage, plan and coordinate unit-level information systems security and integration across platforms, fleets and services; and ensure the proper security, distribution, handling, accounting, reporting, and control of Communications Security (COMSEC) materials, systems and equipment. DoD Relationship O*NET Relationship Group Title DoD Code Occupation Title SOC Code Job Family ADP Computers, General 115000 Telecommunications Equipment 49-2022.00 Installation Installers and Repairers, Except Maintenance Line Installers and Repair Skills Abilities Complex Problem Solving Category Flexibility Critical Thinking Control Precision Equipment Selection Deductive Reasoning Management of Material Resources Finger Dexterity Monitoring Inductive Reasoning Operation and Control Information Ordering Systems Analysis Mathematical Reasoning Systems Evaluation Problem Sensitivity Troubleshooting Written Comprehension Writing Written Expression COMMUNICATIONS SYSTEM OPERATIONS E7 CORE Collect spectrum requirements E5 CORE Conduct communications checks E5 CORE Connect data links E6 CORE Designate circuit frequency assignments E7 NON-CORE Determine Joint restricted frequencies E4 CORE Determine system configuration requirements E6 CORE Develop Combat System Training Team (CSTT) scenarios E6 CORE Develop Communications Plans (COMPLANS) E7 CORE Develop communications policies E7 NON-CORE Develop Joint communications electronics operation instructions E7 NON-CORE Develop spectrum management plans E7 NON-CORE Develop spectrum requirements data call messages E7 NON-CORE Develop spectrum requirements summaries E7 NON-CORE Disseminate spectrum management plans E4 CORE Document communication reports E7 CORE Evaluate Radio Frequency (RF) communications policies IT-15

E7 NON-CORE Identify electromagnetic battlespace E7 CORE Implement communications plans E5 CORE Inspect terminal processors E5 CORE Investigate loss of Facilities Control (FACCON) E6 NON-CORE Issue frequency assignments E4 CORE Maintain communication publications E4 CORE Maintain communications status boards E5 CORE Maintain Radio Frequency (RF) circuit configuration files E5 CORE Monitor Extremely High Frequency (EHF) communications systems E4 CORE Monitor High Frequency (HF) communications systems E5 CORE Monitor International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E4 CORE Monitor Over-The-Air-Transmission (OTAT) operations E4 CORE Monitor portable communications systems E4 CORE Monitor Radio Frequency (RF) systems E4 CORE Monitor Super High Frequency (SHF) communications systems E4 CORE Monitor Ultra High Frequency (UHF) communications systems E4 CORE Monitor Very High Frequency (VHF) communications systems E5 CORE Operate Extremely High Frequency (EHF) communications systems E4 CORE Operate High Frequency (HF) communications systems E5 CORE Operate International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E4 CORE Operate portable communications systems E4 CORE Operate Secure Telephone Equipment (STE) E4 CORE Operate signal data converting Radio Frequency (RF) systems E4 CORE Operate Super High Frequency (SHF) communications systems E4 CORE Operate Ultra High Frequency (UHF) communications systems E4 CORE Operate Very High Frequency (VHF) communications systems E4 CORE Perform Automated Digital Network System (ADNS) backups E6 CORE Prepare Satellite Access Requests (SAR) E4 CORE Report high priority voice communications E6 NON-CORE Resolve electromagnetic interference E4 CORE Restore computer Information Systems (IS) E4 CORE Set up communications subsystems E5 CORE Set up High Frequency (HF) communications systems E5 CORE Set up International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E5 CORE Set up portable communications systems E5 CORE Set up Super High Frequency (SHF) communications systems IT-16

E5 CORE Set up telecommunications circuits for Hazards of Electromagnetic Radiation to Ordnance (HERO) E5 CORE Set up Very High Frequency (VHF) communications systems E5 CORE Set up Extremely High Frequency (EHF) communications systems E5 CORE Set up Ultra High Frequency (UHF) communications systems E5 CORE Troubleshoot advanced functions of Automated Digital Network Systems (ADNS) E5 CORE Troubleshoot Extremely High Frequency (EHF) communications systems E5 CORE Troubleshoot High Frequency (HF) communications systems E5 CORE Troubleshoot International Maritime Satellite (INMARSAT) B High Speed Data (HSD) E4 CORE Troubleshoot portable communications systems E5 CORE Troubleshoot Super High Frequency (SHF) communications systems E5 CORE Troubleshoot Ultra High Frequency (UHF) communications systems E5 CORE Troubleshoot Very High Frequency (VHF) communications systems E5 CORE Update communications status boards E5 NON-CORE Update spectrum use databases E5 CORE Update trouble desk knowledge base E6 CORE Verify communications security policies E7 CORE Verify system certifications MESSAGE SYSTEM OPERATIONS E5 CORE Apply minimize condition procedures E7 CORE Complete communication certification checklists E4 CORE Destroy messages E4 CORE Download naval messages via automated systems E5 CORE Draft communications spot reports E5 CORE Establish connectivity with servicing communications center E4 CORE Maintain communications archives E4 CORE Maintain general message files E4 CORE Maintain local media and technical libraries E4 CORE Maintain message logs E5 CORE Manage operational communications messages E5 CORE Perform communications shifts E4 CORE Prepare messages for transmission E4 CORE Prepare special handling messages E5 CORE Respond to communications spot reports E4 CORE Respond to high precedence messages E4 CORE Respond to special handling messages IT-17

E4 CORE Sanitize communication center E5 CORE Set up message processing system E5 CORE Update communications shifts NETWORK ADMINISTRATION E5 CORE Develop computer Information System (IS) Standard Operating Procedures (SOP) E4 CORE Document customer trouble calls E6 CORE Document offsite technical support actions E5 CORE Operate computer Information Systems (IS) E5 CORE Respond to customer trouble calls IT-18