108 Things a
Hardware Installation and Maintenance
Install/configure mother boards and memory cards/chips into systems (e.g.,
NICs, CPU cards, I/O cards).
Modify operating system to recognize new hardware.
Install and maintain cabling
and device hardware (e.g., peripheral cabling,
Debug cable problems to resolve issues of connectivity (e.g., breakout box,
Assemble components into working systems (e.g., plug components
together, replace controller).
ix/repair computer system to the field replaceable unit level (e.g., disk
failure, network or memory card failure).
Dispose of old equipment and sensitive material (e.g., completely erase disk)
factoring in relevant security and environmental consideration
Peripheral and Device Management
Install/configure peripherals and devices (e.g., jukebox, modems, printers)
Configure device drivers and ports (e.g., serial ports).
Control access to network resources (e.g., printers, modems).
Maintain and configure
local and remote printing capabilities.
Fix/repair printing function failures and problems (e.g., queues, spooling).
up modem banks to maintain incoming/outgoing remote access
Data Integrity Management
administration scheme and plans to mitigate common system
failures, disasters, or emergencies (e.g., file corruption, hardware failures,
power surges, fire, theft).
Prepare/maintain backup media tracking system (e.g., tapes, CD ROM,
ecessary system files on appropriate device/media (e.g., magnetic
Restore files and system from backup device/media.
Reinstall/repair operating system (e.g., corrupt kernel image, volume
Maintain/reinitialize or repair disk drives.
erify/ensure integrity of backups.
Data Storage Management
Prepare disk and layout for data (e.g., RAID management,
Connect and/or configure new storage devices.
Monitor, verify, and correct file systems (e.g., fsck, Checkd
Create, modify, and organize directory structures.
Monitor, set, and change file permissions to control user access.
Monitor and correct corrupted files
Monitor file system usage (e.g., disk space remaining, disk usage over time).
Reevaluate/redesign file systems layout (e.g., add/shrink/enlarge file
Network Configuration and Management
Coordinate network topology and design with network administrators (e.g.,
new installation, upgrade).
Plan, obtain, assign, and manage
Internet names (e.g., DNS, domain name
Plan, obtain, assign, and manage Internet addresses (e.g., DHCP, AS
numbers, OSPF areas).
Configure and manage network file/data synchronization and/or distribution
(e.g., rdist, SMS).
Configure and man
age network time sychronization in servers (e.g., ntpd).
Configure and manage network file systems and servers (e.g., NFS, RFS,
Monitor connectivity to detect network faults and measure network
performance (e.g., ping, traceroute).
t and correct network failures (e.g., cables, hubs, routing).
Configure network interfaces (e.g., netmask, broadcast, speed, mode, ppp
Internet Services and Electronic Mail Systems
Configure mail systems (e.g., MTA, anti
and manage mail aliases and distribution lists.
Install, configure, and manage mail reading applications (e.g., Eudora, Elm,
Manage the web server and server
related programs (e.g., Apache, IIS).
Install and configure non
web host services (e.g.,
Install, configure, and manage network news, bulletin board, and chat
Software System Development, Configuration, and
Locate/download software packages and patches from the Internet or
, and configure operating systems (e.g., NT, Linux).
Install upgrades and operating system patches and service packs.
Build, install, and configure application software and tools (e.g., third
public domain, or shareware).
Debug application software
problems (e.g., business
specific software such
as Adobe software such as Adobe Acrobat or Netscape).
Port system utilities to other operating system environments (e.g., convert
script from Perl4 to Perl5, convert script from Unix to NT).
lity and inter
operability issues (i.e., resolving machine
Audit/evaluate existing source code for problems (e.g., for buffer overflows,
Y2K related issues).
User Support and Help Desk
Configure/create templates for user interfaces
and user environment (e.g.
CDE, browser, windows, log in scripts, shell rc files).
Identify and translate potential or actual user needs into technical
Verify, remove, and disable user accounts (e.g., logins, passwords, shells,
Manage user privileges (e.g., security levels in groups, file server access).
Train and orient new and existing users.
Respond to user requests, trouble reports, and questions.
Triage and dispatch user requests to appropriate personnel.
system status (e.g., planned outages, cause of network
crashes) to users.
Write local environment documentation to support users (e.g., FAQ).
Evaluate potential problems, liabilities, and costs of potential or actual
security attacks (i.e., risk
Identify/evaluate/implement security mechanisms and tools (e.g., IDS,
tripwire utilities, intrusion prevention software, firewalls, TCP wrappers).
Formulate security procedures to prevent, detect, and respond to internal
and external security t
hreats (e.g., passwords).
Evaluate and create site security plans.
Monitor and detect security threats, holes, and attacks (e.g., viruses,
detecting users with no passwords, unlocked administrative systems).
Analyze internal/external security attacks (e.g.
, scan system logs for
incidents, analyze network packets, implement intrusion detection software).
Deploy and manage authentication systems (e.g., tokens, one
passwords, Kerberos, NIS).
Manage cryptographic facilities to protect sensitive information
applications (e.g., PGP encryption in electronic mail).
Respond, resolve, and report security incidents (e.g., unauthorized access to
Monitor emerging security threats/tools/issues (e.g., via security news
ic security audits to ensure security has not been breached or
System Resource Management and Performance Tuning
level agreements for site primary services.
Debug and/or optimize network performance and performance iss
Manage system resources (e.g., monitor user disk and print quotas, CPU
usage, swap usage).
Evaluate and optimize system resources (e.g., organize disk space and
Manage system processes (e.g., signaling, changing priorities).
system configuration (e.g., add or modify services,
Perform housekeeping and clean
up activities (e.g., remove files, log
rotation, archive, delete old users).
Develop or enhance software tools to automate tasks (e.g., write scri
Plan and build high
availability systems for critical services (e.g., business
critical environments such as banking, real
Technical Record Keeping and Procedural Documentation
Develop/maintain operational instructions and procedures (
e.g., How Tos,
runtime procedures, runbook).
Develop/maintain records and technical documentation (e.g., software
version numbers, user logins, system architecture, licenses, descriptions).
Develop/maintain daily operation logs to track problems and to est
audit trail to debug and isolate potential problems (e.g., track mean time
between failures and uptimes).
Audit and inventory user licenses to ensure legal compliance.
Maintain data in work request and tracking systems (e.g., Remedy, clarify,
Procurement and Vendor Relations
Evaluate needs and develop system design and upgrade
Research and evaluate hardware/software/equipment to satisfy requirements
(e.g., user needs, budgetary, legal, technical specificatio
Write software/hardware specifications to meet user needs (e.g., RFI, RFP).
Evaluate and recommend third
party products and services.
Develop/write purchase justification (e.g., based on growth and needs).
nts and terms with provider to
optimize costs and/or services (e.g., technical support, equipment,
Establish and cultivate relationship with vendor for problem resolution,
technical support, etc.
Monitor vendor contract performance (e.g.,
track vendor response time).
Place, manage, and track equipment orders.
Establish/update equipment inventory.
Provide/solicit information to/from vendor to fix software_ to/from vendor to
fix software bugs and problems.
Supervise and manage technical staff.
Anticipate and plan computer system resources for future needs (i.e., system
Anticipate and plan network resources for future needs (e.g.,
d plan human resources for future technical needs (i.e.,
hiring and staffing).
Manage relations between the technical staff and the user community.
Audit system and equipment to ensure readiness and compliance with
industry standards (e.g., ISO 9000, Y2K).
Formulate and enforce information technology
procedures, and guidelines.
Recommend resource allocation policies, privacy policies, and user
policies (e.g., use of email and Internet, disk allocation).
nd plan computer operation center resources to meet
future needs (e.g., air conditioning, electrical capacity).
Coordinate with facilities manager to secure power, space, and
environmental resources (e.g., power
UPS, fire suppression, HVAC,
ting, safety, shelving) for computer operation center(s).
Plan for and evaluate physical security of computer operation center(s)
(e.g., install cable locks on desktops).