Administers and controls the activities related to data planning and development.
Evaluates system specifications, input/output processes, and working parameters for hardware/software compatibility.
Ensures network security access and protects against unauthorized access, modification or destruction.
Provides technical assistance and support related to computer systems, software and hardware through the IT Help Desk ticket.
Improves existing systems by reviewing objectives and specifications, recommending changes, evaluating proposed changes and making approved modifications.
Establishes policies and procedures pertaining to system management, security, maintenance, and utilization.
Performs system backups of critical file servers and databases.
Performs Windows 2008 r2/2012 Server administration.
Analyzes network and computer systems to determine future growth needs.
Installs, repairs, and upgrades servers and network components.
Troubleshoots networking and operating system issues.
Conducts ongoing performance tuning, hardware upgrades, and resource optimization.
Configures CPU, memory, and disk partitions.
Ensures system stability and connectivity while providing immediate and rapid support with minimal downtime or interference.
Ensures completion of RMF requirements and implementation of technical solutions to complex discipline-specific problems, to include STIG requirements
Ensures the completion of programs, projects or tasks within estimated time frames and budget constraints.
Ensures that the quality of the program, project or task deliverable meets the established standards or metrics.
Provides information assurance guidance and documentation throughout the system development life-cycle.
Supports all phases of the security authorization process.
Ensures that the design of hardware, operating systems, and software applications proposed for OPNAV CIO programs adequately addresses IA security requirements.
Provides confidentiality, integrity, availability, authentication, and non-repudiation.
Enables IA system designs that properly mitigate identified threats and vulnerabilities.
Reviews and approves test and evaluation activities to validate those threats and vulnerabilities are mitigated.