IT Specialist (CustSpt) Government - Fort Smith, AR at Geebo

IT Specialist (CustSpt)

1. Manages the assigned IT/communications environment with privileged access at the network level for the Wing, Geographically Separated Units (GSU), and Tenants. Plans, coordinates, installs, and continuously analyzes system design, hardware and software. Develops, recommends, and installs solutions and upgrades to ensure availability, integrity, efficiency, and reliability of all components of the assigned system. Provides Information Assurance systems support for all disciplines, ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network services. Performs system audits to assess security parameters and performance of IA controls within the network environment. 2. Serves as a focal point for ensuring functionality and operability of the assigned IT/data systems/functions, voice and wireless systems to support mission requirements of Wing, Geographically Separated Units (GSU), and Tenants. Optimizes the functionality and performance of hardware and software systems and ensures availability, integrity, efficiency, and reliability of system/functional resources while managing the communications focal point coordination and workload distribution duties. Analyzes, manages, and directs installation of any new hardware or software introduced into the environment to ensure its compatibility with existing architecture, its reliability, and functionality in relation to the organization's business requirements. Runs tests to verify operability and functionality; analyzes hardware and software malfunctions to resolve physical and logical processing problems; and recommends acquisition of programs, process or equipment which will resolve operational problems. Provides on-going optimization and problem solving support; continually surveys system operation to identify potential systems problems which could lead to loss or serious interruption of service. Oversees and initiates corrective or preventative measures to rectify immediate problems and prevent future occurrences through the CFP. Troubleshoots and diagnoses system failures to isolate source of problems. Performs testing, troubleshoots, corrects problems, and distributes workload relative to interface and interoperability of system components such ashardware, systems software, and applications programs. Provides proactive consultation and instruction with system users and technical specialists to ensure seamless implementation of changes. Assesses and mitigates security vulnerabilities of installed system hardware and software. 3. Provides customer technical assistance and support for all users. Provides ongoing technical support to customers to ensure proper functional use of equipment and programs and to preclude undue interruptions to IT and communications services. Works with customers to ensure efficient operations which support each units' requirements. Assists in solving problems associated with delivery of hardware and software orders. Provides management with information necessary to address difficult and complex problems in automating work processes. Tracks life of system equipment, prepares and provides analyses to determine future maintenance and replacement costs to help justify budget submissions. Reviews purchase requests and statements of work, ensuring documentation is sufficient to justify enhancements necessary to keep systems current and ensuring requested equipment and applications are compatible with existing infrastructure. Promotes use of assigned systems by providing instructions to functional area users on IT/communications processes and procedures associated with each supported system. Works with the CFP and customers to resolve integration or configuration related issues associated with a variety of different system platforms, operating systems, applications, and equipment configurations. 4. Determines customer requirements and assists customers by recognizing and analyzing trends and providing instruction and orientation services. Identifies and documents system requirements for specific needs of customers. Conducts in-depth analyses of system usage, user complaints, traffic interruptions, hardware and software capabilities, and other relevant factors. Recommends methods and procedures and coordinates corrective action to optimize utilization of present equipment. Ensures upgrades to the base IT and communications infrastructure are identified and assists customers in developing and submitting recommendations for additional equipment and funds. Cooperates and works with unit personnel in planning and developing new or additional infrastructure/architecture capabilities. Identifies potential performance or capacity problems. Works with technical support personnel in resolving problems. Manages system user accounts, resets system passwords, and resolves firewall issues. DUTIES CONTINUED UNDER EDUCATION GENERAL
Experience:
Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems. SPECIALIZED
Experience:
Must prove at least 36 months experience that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. PLACEMENT FACTORS:
Applicants should demonstrate through prior experience the following:
-- Knowledge of applying analysis concepts to IT network systems and independent IT platforms, integration methods, performance tuning methods, test and evaluation methods and procedures, IT security principles and methods plus, project management principles and methods sufficient to plan and coordinate the installation of new products or equipment.-- Ability to analyze, apply methods and practices for recovering, adjusting and modifying IT systems to solve complex problems, while improving customer support practices, that minimizes interruptions in service. -- Knowledge of network operations, security methods, and network architecture optimization techniques; the capabilities and limitations of the IT systems, infrastructure and software configuration in order to manage the tenant network, carry out network and/or independent platform projects and coordinate efforts with others affected in the organization. -- Knowledge of systems development, modification, testing, installation, operations, and support concepts as well as the organization's network and infrastructure architecture and protocols to provide support related to:
test, evaluation, installation, configuration and modification of hardware and software for operating systems, network platform, and interface connectivity. Provision of network services and planning for increased or changed requirements; modifications and integration of network systems and infrastructure consistent with existing or planned infrastructure/architecture; configuration management changes and upgrades; and connectivity between remote sites. -- Knowledge of the interrelationship of multiple IT systems, utilizing methods, principles, and practices covering restoral from complex computer and infrastructure system failures, recovery of systems, adjusting, modifying, and improving systems to include hardware and software components. -- Knowledge of methods and practices involved in the integration of system components sufficient to optimize system performance. -- Knowledge of performance measurement tools, systems testing and diagnostics, COTS products, Internet technologies, analytical methods and practices, requirements analysis techniques in order to:
test and optimize the functionality of the systems, networks, and data; provide advice on a wide range of IT issues; ensure optimal use of commercially available products; represent the organization in interactions with other organizations; prepare and present reports; conduct analyses and recommend resolution of difficult issues; identify and define business requirements applied to the development, implementation management and support of systems and networks; etc. -- Knowledge of IT security principles and products; DOD and agency policies, procedures, regulations, directives, and requirements related to physical, personnel, emanations, and information security; methods for evaluating risk or vulnerability; IT INFOSEC security requirements for certification and accreditation; network operations and protocols; systems testing and evaluation, and performance management methods sufficient to plan and conduct security accreditation reviews for installed systems or networks and assess and advise on new or revised security measures and countermeasures based on the results of accreditation reviews.-- Knowledge of the mission, objectives, terminology, and management practices Wing and tenant organizations to recognize probable areas of interaction and overlap between proposed and existing systems, system modifications and upgrades. -- Ability to gather facts and use effective analytical and evaluative methods to assess information, plan the sequence of actions necessary, make sound decisions, and solve a variety of complex IT device and infrastructure problems. -- Ability to communicate effectively both orally and in writing and maintain effective relationships. -- Ability to modify existing systems and relate all aspects of the work to overall system requirements, advise on and implement new technology, and offer alternative approaches in operating systems development and/or problem resolution.Ability to stay well informed on rapidly changing technology to evaluate its possible impact on organization missions and to develop plans to satisfy requirements. -- Knowledge of a wide range of IT concepts, principles, and practices, to accomplish work processes through the use of data transport devices, methods, services, and facilities. Work encompasses complex and uncommon interfaces and policies and practices; sources of technical data to evaluate new devices, proposals, and approaches for satisfying communications requirements; and a practical understanding of contracting procedures and legal requirements. -- Knowledge of operational and performance characteristics of data/voice transport to define, coordinate, plan, and satisfy user requirements for equipment, systems, or services, and to review, develop, or interpret communications policies and procedures. -- Knowledge of DoD, Air Force, NGB, and ANG communications regulations, services, and instructions to ensure telecommunications services are in compliance with applicable regulations and instructions. -- Knowledge of commonly used practices, guides, and a broad range of operating techniques concerning both standard and unique IT systems design installation and concept of operations.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $65,141 to $84,682 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.