IT SPECIALIST (CUSTSPT) (Title 32) Government - Draper, UT at Geebo

IT SPECIALIST (CUSTSPT) (Title 32)

As a IT SPECIALIST (CUSTSPT) (Title 32), GS-2210-9/11, you will:
This is not an all-inclusive list Serves as a technical expert on all supported automated systems utilized throughout the state. Systems used include personal computers, mini computers and mainframes. Develops and maintains the customer service database for all service requests. Receives, analyzes, and assigns control numbers to all incoming customer requests. Determines if equipment is covered by warranty or maintenance contract and processes accordingly. Performs intensive collection and analysis of data from the customer service database to create trend reports, performance reports, and future requirements for all areas of Information Management. Provides database maintenance on the customer support database. Researches trends and patterns to implement new or improved communications methods and procedures. Conducts site surveys for information systems designed to verify adequacy of network operations and ensure customer needs are met. Consults with users and managers to determine specific locations and requirements for the particular system installation. Installs and maintains hardware devices supporting a broad range of information systems employing multiple network and local operating systems and highly sophisticated client server software. Uses detailed reference material and sophisticated diagnostic equipment and complex diagnostic software to identify and resolve internal system and network conflicts. Removes and replaces defective hardware components; installs network/peripheral device interface cards. Performs limited upgrade of hardware to include memory, fixed storage, and installation of network interface cards (NIC) or enhancement cards. Installs and configures workstation or network operating systems, and applications software on a wide range of configurable information systems devices. Configures a wide variety of devices requiring diverse interfaces and device drivers in multiple operating system environments using a wide variety of hardware platforms. Enforces command standards for hardware and software configurations. Troubleshoots and corrects complex software problems to include resolving conflicts between applications, hardware and/or device conflicts, and operating system faults. Detects and removes computer viruses. Restores and repairs critical data files. Updates hardware and software architecture databases to reflect installations, turn-ins, and changes in reportable software. Performs operational tests on equipment in test array or operational configuration prior to issue or installation to ensure proper operation and absence of hardware, software, device or network conflicts. Your resume must have complete information:
Please ensure your resume accurately reflects the duties and responsibilities under each position you have held with each employer. In describing your experience, please be clear and specific. If your resume does not provide enough information regarding your work history for us to make a creditable qualification determination, your application package may be rendered disqualified and you will no longer be considered for this position. Do not copy the job description or your military MOS/AFSC/job duty description as your job duties. If you do this on your resume you will be rendered disqualified for the vacancy. Job duties should be related to the duties listed on this job announcement. It is your responsibility to make sure your resume states complete information for each job entry (beginning and ending dates of employment stated as MM/YYYY; and total hours worked per week). GENERAL
Experience:
Experience, education or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required to automate a work process. Experience may have been gained in work such as computer operator or assistant, computer sales representative, program analyst, or other positions that required the use or adaptation of computer programs and systems. SPECIALIZED
Experience:
GS-09 - Must have at least 24 months experience, education, or training in analysis of the interrelationship of pertinent components of the system. Experience planning the sequence of actions necessary to accomplish the assignment. Experience scheduling the sequence of programs to be processed by computers where alternatives had to be weighed with a view to production efficiency. GS-11 and above - Must have at least 36 months experience, education, or training that approaches techniques and requirements appropriate to an assigned computer applications area or computer specialty area in an organization. Experience planning the sequence of actions necessary to accomplish the assignment where this entailed coordination with others outside the organizational unit and development of project controls. Experience that required adaptations of guidelines or precedents to meet the needs of the assignment. Experience preparing documentation on cost/benefit studies where is involved summarizing the material and organizing it in a logical fashion. This position conducts information assurance functions. The incumbent shall comply with the requirements of the certification program requirements outlined in DoD instruction 8570.01-M. The incumbent will be required to obtain and maintain certification within six (6) months of hiring. Submit copies of IT certifications if available
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $59,315 to $84,682 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.