Information Technology Specialist Frontier Enterprises Apprentice

Hybrid-based occupation
Onet code: 15-1212.00

1

Years

23

Skills

60h

Related instruction

2000h

On-the-job training
Classroom Instruction Topics
  • Cybersecurity Bootcamp
On-the-job Training
  • Competencies
    • Develop computer or information security policies or procedures.
    • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
    • Update knowledge about emerging industry or technology trends.
    • Monitor current reports of computer viruses to determine when to update virus protection systems.
    • Implement security measures for computer or information systems.
    • Modify computer security files to incorporate new software, correct errors, or change individual access status.
    • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
    • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
    • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
    • Test computer system operations to ensure proper functioning.
    • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
    • Collaborate with others to resolve information technology issues.
    • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
    • Document operational procedures.
    • Document computer security and emergency measures policies, procedures, and tests.
    • Troubleshoot issues with computer applications or systems.
    • Coordinate project activities with other personnel or departments.
    • Coordinate implementation of computer system plan with establishment personnel and outside vendors.
    • Monitor the security of digital information.
    • Monitor use of data files and regulate access to safeguard information in computer files.
    • Train others in computer interface or software use.
    • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Hours
calendar.svg
Get on our calendar
Not sure if WorkHands is right for you? Chat with our team today
sendEmail.svg
Send us an email
We'll get back to you shortly