Profession ICT network administrator
ICT network administrators maintain operation of a reliable, secure, and efficient data communications network, including LAN, WAN, intranet, and internet. They perform network address assignment, management and implementation of routing protocols such as ISIS, OSPF, BGP, routing table configurations and certain implementations of authentication. They perform maintenance and administration of servers (file servers, VPN gateways, intrusion detection systems), desktop computers, printers, routers, switches, firewalls, phones, IP communications, personal digital assistants, smartphones, software deployment, security updates and patches as well as a vast array of additional technologies inclusive of both hardware and software.
Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.
- Investigative / Realistic
- Quality assurance methodologies
Quality assurance principles, standard requirements, and the set of processes and activities used for measuring, controlling and ensuring the quality of products and processes.
- ICT security legislation
The set of legislative rules that safeguards information technology, ICT networks and computer systems and legal consequences which result from their misuse. Regulated measures include firewalls, intrusion detection, anti-virus software and encryption.
- ICT network routing
The processes and techniques for choosing the best paths within an ICT network through which a packet can travel.
- Cloud technologies
The technologies which enable access to hardware, software, data and services through remote servers and software networks irrespective of their location and architecture.
- ICT performance analysis methods
The methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, application times, wait latencies and benchmarking results.
- ICT network security risks
The security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the consequences of security threats and contingency plans for each security risk factor.
- Solution deployment
The technologies and standards to be used during the installation, deployment and maintenance of software characteristics.
- Procurement of ICT network equipment
The products available from network equipment providers and methods for selecting and procuring the equipment.
- Network management system tools
The software or hardware tools which enable monitoring, analysis and supervision of individual network components or network parts within a larger network system.
- Internet governance
The principles, regulations, norms and programs that shape the evolution and use of internet, such as internet domain names management, registries and registrars, according to ICANN/IANA regulations and recommendations, IP addresses and names, name servers, DNS, TLDs and aspects of IDNs and DNSSEC.
- ICT system programming
The methods and tools required to develop system software, specifications of system architectures and interfacing techniques between network and system modules and components.
- Computer programming
The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms (e.g. object oriented programming, functional programming) and of programming languages.
- Adjust ICT system capacity
Change the scope of an ICT system by adding or reallocating additional ICT system components, such as network components, servers or storage to meet capacity or volume demands.
- Implement ICT network diagnostic tools
Use software tools or components that monitor ICT network parameters, such as performance and throughput, provide data and statistics, diagnose errors, failures or bottlenecks and support decision making.
- Manage email hosting service
Oversee the day-to-day running of a private email platform by maintaining and refining provided services, such as spam and virus protection, blocking advertisement, website redesigns and search engine optimisation.
- Provide technical documentation
Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and compliant with defined requirements and standards. Keep documentation up to date.
- Define firewall rules
Specify rules to govern a set of components aiming to limit access between groups of networks or a particular network and the internet.
- Perform backups
Implement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integrity during system integration and after data loss occurrence.
- Analyse network bandwidth requirements
Study the requirements on the transmission capacity of an ICT network or other telecommunication system.
- Forecast future ICT network needs
Identify current data traffic and estimate how growth will affect the ICT network.
- Apply ICT system usage policies
Follow written and ethical laws and policies regarding proper ICT system usage and administration.
- Interpret technical texts
Read and understand technical texts that provide information on how to perform a task, usually explained in steps.
- Design computer network
Develop and plan ICT networks, such as wide area network and local area network, that connect computers using cable or wireless connections and allow them to exchange data and assess their capacity requirements.
- Install electronic communication equipment
Set up and deploy digital and analogue electronic communications. Understand electronic diagrams and equipment specifications.
- Integrate system components
Select and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system. Apply specific testing techniques to ensure integrity during system integration.
- Maintain internet protocol configuration
Apply Internet Protocol Configuration (ipconfig) to gather data on Transmission Control Protocol/Internet Protocol (TCP/IP) configuration values in order to identify devices and their IP addresses.
- Manage ICT virtualisation machines
Oversee tools, such as VMware, kvm and Xen, used to enable a virtual machine environment which runs on top of other software environments.