Skills
These are all the skills.
Network support
Providing maintenance and support services for communications networks.
Systems installation and removal
Installing and testing, or decommissioning and removing, systems or system components.
Configuration management
Planning, identifying, controlling, accounting for and auditing of configuration items (CIs) and their interrelationships.
Release and deployment
Applying the processes, systems and functions required to make new and changed services and features available for use.
Storage management
Planning, implementing and optimising the technologies and processes used for data storage.
Facilities management
Planning, designing and managing the buildings, space and facilities which, collectively, make up the IT estate.
Service level management
Agreeing targets for service levels and assessing, monitoring, and managing the delivery of services against the targets.
Service catalogue management
Providing a source of consistent information about available services and products to customers and users.
Availability management
Ensuring that services deliver agreed levels of availability to meet the current and future needs of the business.
Capacity management
Ensuring that service components have the capacity and performance to meet current and planned business needs.
Incident management
Coordinating responses to incident reports, minimising negative impacts and restoring service as quickly as possible.
Problem management
Managing the life cycle of all problems that have occurred or could occur in delivering a service.
Change control
Assessing risks associated with proposed changes and ensuring changes to products, services or systems are controlled and coordinated.
Asset management
Managing the full life cycle of assets from acquisition, operation, maintenance to disposal.
Service acceptance
Managing the process to obtain formal confirmation that service acceptance criteria have been met.
Security operations
Delivering management, technical and administrative services to implement security controls and security management strategies.
Vulnerability assessment
Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.
Digital forensics
Recovering and investigating material found in digital devices.
Penetration testing
Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers.
Performance management
Improving organisational performance by developing the performance of individuals and workgroups to meet agreed objectives with measurable results.