Infocomm TechnologyInformation and communications technology professionalsISCO 2522
ICT system administrator
ICT system administrators are responsible for the upkeep, configuration, and reliable operation of computer and network systems, servers, workstations and peripheral devices. They may acquire, install, or upgrade computer components and software; automate routine tasks; write computer programs; troubleshoot; train and supervise staff; and provide technical support. They ensure optimum system integrity, security, backup and performance.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (32)
domain name servicedomain name serviceNaming database which maps internet domain names to Internet Protocol (IP) addresses. The Domain Name System allows internet users to utilise names such as website titles instead of remembering numeri...digital systemsdigital systemsSystems to store, process and spread information in digital form. They are hardware, software and networks, as well as the ways in which these can be employed.organisational policiesorganisational policiesThe policies to achieve set of goals and targets regarding the development and maintenance of an organisation.software components librariessoftware components librariesThe software packages, modules, web services and resources that cover a set of related functions and the databases where these reusable components can be found.hardware componentshardware componentsThe essential components that make up a hardware system, such as liquid-crystal displays (LCD), camera sensors, microprocessors, memories, modems, batteries and their interconnections.security engineeringsecurity engineeringInterdisciplinary field of study that focuses on the realisation of secure systems and the technology to protect individuals or information from malice, errors, or unauthorized access. It involves def...ICT system programmingICT system programmingThe methods and tools required to develop system software, specifications of system architectures and interfacing techniques between network and system modules and components.quality assurance methodologiesquality assurance methodologiesQuality assurance principles, standard requirements, and the set of processes and activities used for measuring, controlling and ensuring the quality of products and processes.ICT system user requirementsICT system user requirementsThe process intended to match user and organisation's needs with system components and services, by taking into consideration the available technologies and the techniques required to elicit and speci...ICT infrastructureICT infrastructureThe system, network, hardware and software applications and components, as well as devices and processes that are used in order to develop, test, deliver, monitor, control or support ICT services.network standardsnetwork standardsRegulated standards that provide the technical guidelines, specifications, and requirements to ensure safe and efficient interoperability between devices, software, equipment, and organisations. Netwo...operating systemsoperating systemsThe features, restrictions, architectures and other characteristics of operating systems such Linux, Windows, MacOS, etc.migrate existing datamigrate existing dataApply migration and conversion methods for existing data, in order to transfer or convert data between formats, storage or computer systems.apply system organisational policiesapply system organisational policiesImplement internal policies related to the development, internal and external usage of technological systems, such as software systems, network systems and telecommunications systems, in order to achi...administer ICT systemadminister ICT systemHandle components of ICT system by maintaining configuration, managing users, monitoring resource use, performing backups and installing hardware or software to comply with the set requirements.implement ICT security policiesimplement ICT security policiesImplement statements, assertions or rules that specify the appropriate use and protection of the ICT assets and systems from an organisation. These ICT security policies cover topics such as data clas...manage changes in ICT systemmanage changes in ICT systemPlan, realise and monitor system changes and upgrades. Maintain earlier system versions. Revert, if necessary, to a safe older system version.manage system securitymanage system securityAnalyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and imple...use back-up and recovery toolsuse back-up and recovery toolsUse tools which allow users to copy and archive computer software, configurations and data and recover them in case of loss.interpret technical textsinterpret technical textsRead and understand technical texts that provide information on how to perform a task, usually explained in steps.monitor system performancemonitor system performanceMeasure system reliability and performance before, during and after component integration and during system operation and maintenance. Select and use performance monitoring tools and techniques, such ...apply ICT system usage policiesapply ICT system usage policiesFollow written and ethical laws and policies regarding proper ICT system usage and administration.solve ICT system problemssolve ICT system problemsIdentify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.implement a virtual private networkimplement a virtual private networkCreate an encrypted connection between private networks, such as different local networks of a company, over the internet to ensure that only authorized users can access it and that the data cannot be...implement anti-virus softwareimplement anti-virus softwareDownload, install and update software to prevent, detect and remove malicious software, such as computer viruses.manage system testingmanage system testingSelect, perform and track testings on software or hardware to detect system defects both within the integrated system units, the inter-assemblages and the system as a whole. Organise testings such as ...perform backupsperform backupsImplement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integri...support ICT system userssupport ICT system usersCommunicate with end users, instruct them on how to progress with tasks, use ICT support tools and methods to solve problems and identify possible side effects and provide solutions.implement a firewallimplement a firewallDownload, install and update a network security system designed to prevent unauthorized access to a private network.integrate system componentsintegrate system componentsSelect and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system.maintain ICT systemmaintain ICT systemSelect and apply system and network monitoring techniques. Identify and fix operational problems. Ensure that system's capabilities and efficiency match company specifications.implement ICT recovery systemimplement ICT recovery systemCreate, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.
Optional (26)
network engineeringnetwork engineeringThe subfield of computer technology that concerns the managing the connectivity of networks through data, voice, calls and wireless network services.systems development life-cyclesystems development life-cycleThe sequence of steps, such as planning, creating, testing and deploying and the models for the development and life-cycle management of a system.Apache TomcatApache TomcatThe open-source web server Apache Tomcat provides a Java web server environment which uses a built in container where HTTP requests are loaded, allowing the Java web applications to run on local and s...cloud security and compliancecloud security and complianceCloud security and compliance concepts, including shared responsibility model, cloud access management capabilities, and resources for security support.interfacing techniquesinterfacing techniquesThe techniques that relate to interfaces between models and components.ICT accessibility standardsICT accessibility standardsThe recommendations for making ICT content and applications more accessible to a wider range of people, mostly with disabilities, such as blindness and low vision, deafness and hearing loss and cognit...internet governanceinternet governanceThe principles, regulations, norms and programs that shape the evolution and use of internet, such as internet domain names management, registries and registrars, according to ICANN/IANA regulations a...ICT system integrationICT system integrationThe principles of integrating ICT components and products from a number of sources to create an operational ICT system, techniques which ensure interoperability and interfaces between components and t...cloud monitoring and reportingcloud monitoring and reportingThe metrics and alarms utilizing cloud monitoring services, in particular performance and availability metrics.IBM WebSphereIBM WebSphereThe application server IBM WebSphere provides flexible and secure Java EE runtime environments to support application infrastructure and deployments.cloud technologiescloud technologiesThe technologies which enable access to hardware, software, data and services through remote servers and software networks irrespective of their location and architecture.ICT recovery techniquesICT recovery techniquesThe techniques for recovering hardware or software components and data, after failure, corruption or damage.system designsystem designThe process of defining the architecture for different components and modules of a system, as well as the relevant data, for satisfying specific requirements.use different communication channelsuse different communication channelsMake use of various types of communication channels such as verbal, handwritten, digital and telephonic communication with the purpose of constructing and sharing ideas or information.provide ICT system trainingprovide ICT system trainingPlan and conduct training of staff on system and network issues. Utilise training material, evaluate and report on the learning progress of trainees.store digital data and systemsstore digital data and systemsUse software tools to archive data by copying and backing them up, in order to ensure their integrity and to prevent data loss.implement ICT risk managementimplement ICT risk managementDevelop and implement procedures for identifying, assessing, treating and mitigating ICT risks, such as hacks or data leaks, according to the company's risk strategy, procedures and policies. Analyse ...remove computer virus or malware from a computerremove computer virus or malware from a computerCarry out actions to remove computer viruses or other types of malware from a computer.acquire system componentacquire system componentObtain hardware, software or network components which match other system components in order to expand it and perform necessary tasks.interact with users to gather requirementsinteract with users to gather requirementsCommunicate with users to identify their requirements and collect them. Define all relevant user requirements and document them in an understandable and logical way for further analysis and specificat...adjust ICT system capacityadjust ICT system capacityChange the scope of an ICT system by adding or reallocating additional ICT system components, such as network components, servers or storage to meet capacity or volume demands.implement spam protectionimplement spam protectionInstall and configure software that supports email-users to filter messages that contain malware or that are unsolicited.automate cloud tasksautomate cloud tasksAutomate manual or repeatable processes to minimize management overhead. Evaluate cloud automation alternatives for network deployments and tool-based alternatives for network operations and managemen...manage cloud data and storagemanage cloud data and storageCreate and manage cloud data retention. Identify and implement data protection, encryption, and capacity planning needs.execute integration testingexecute integration testingPerform testing of system or software components grouped in multiple ways to evaluate their ability to interconnect, their interface and their ability to provide global functionality.install signal repeatersinstall signal repeatersSet up and configure devices which enhance strength of signal of a communication channel to enable proper reception and reproduction in further places.
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
84/ 100
Very High Risk
Low riskHigh risk