| Day-to-Day Support |
| "It doesn't work" |
|
|
|
|
| "How do I ..." |
|
|
|
|
| Help desk level 1 |
|
|
|
|
| Help desk advanced |
|
|
|
|
| SOC help desk |
|
|
|
|
| User Management |
| IT-related onboarding steps |
|
|
|
|
| IT-related offboarding steps |
|
|
|
|
| Add and remove network users |
|
|
|
|
| Active Directory maintenance |
|
|
|
|
| Group Policy management |
|
|
|
|
| Hardware Management & Support |
| Define, implement, manage user-owned devices |
|
|
|
|
| Define, implement, manage company-owned devices |
|
|
|
|
| Define, implement, manage remote work policies |
|
|
|
|
| Define, implement, manage equipment acquisition policies |
|
|
|
|
| Research, recommend equipment |
|
|
|
|
| Setup new desktops, laptops |
|
|
|
|
| Setup new internal servers |
|
(1) |
|
|
| Configure for Windows updates |
|
|
|
|
| Configure based on company policies |
|
|
|
|
| Monitor for company policy compliance |
|
|
|
|
| Support company-approved user-owned devices |
|
|
|
|
| Troubleshoot, repair desktops, laptops, printers, servers |
|
(1) |
|
|
| Maintain fiewall firmware updates |
|
|
|
|
| Install routers, switches |
|
|
|
|
| Monitor disk usage alerts |
|
|
|
|
| Software/Application Management & Support |
| Participate in software/application review, approval |
|
|
|
|
| Define, implement, manage software acquisition policies |
|
|
|
|
| Review, approve vendor solutions |
|
|
|
|
| Setup new user email accocunt |
|
|
|
|
| Setup new user hosted applications account |
|
|
|
|
| User support for approved applications, software |
|
|
|
|
| Monitor for non-approved software installs, downloads |
|
|
|
|
| Support internal development team |
|
|
|
|
| Monitor third party application updates, vulnerabilities |
|
|
|
|
| Backup Management |
| Review, approve vendor solutions |
|
|
|
|
| Define company backup, recovery, retention policies |
|
|
|
|
| Configure internal network backups |
|
|
|
|
| Monitor daily backup activity |
|
|
|
|
| Resolve backup issues |
|
|
|
|
| Configure hosted application backups |
|
|
|
|
| Monitor hosted application backups |
|
|
|
|
| Resolve hosted application backup issues |
|
|
|
|
| Security Management |
| Define, oversee company security policies, processes, procedures with C-suite |
|
|
|
|
| Understand cyber insurance terms, conditions, exclusions |
|
|
|
|
| Regularly communicate, educate company security policies to all employees |
|
|
|
|
| Conduct network discoveries |
|
|
|
|
| Conduct vulnerability discoveries |
|
|
|
|
| Conduct pen testing |
|
|
|
|
| Conduct compliance assessments |
|
|
|
|
| Conduct security awareness training |
|
|
|
|
| Security policy management |
|
|
|
|
| Access control management |
|
|
|
|
| WAN security configuration and management |
|
|
|
|
| Advanced firewall configuration and management |
|
|
|
|
| Network traffic monitoring |
|
|
|
|
| Password policy management |
|
|
|
|
| Risk management |
|
|
|
|
| Risk analysis calculations |
|
|
|
|
| Data Management and Governance |
| Define, implement, monitor data security policies and procedures |
|
|
|
|
| Create, maintain company data mapping |
|
|
|
|
| Define data access roles, rights |
|
|
|
|
| Implement data access roles, rights |
|
|
|
|
| Monitor data access activity |
|
|
|
|
| Perform regular PII/PCI scans if applicable |
|
|
|
|
| Monitor data collection, storage, disposal |
|
|
|
|
| Asset Management |
| Create hardware inventory |
|
|
|
|
| Create software inventory |
|
|
|
|
| Maintain hardware inventory |
|
|
|
|
| Maintain software inventory |
|
|
|
|
| Manage equipment disposal according to company policy |
|
|
|
|
| Risk Management Policies and Procedures |
| Create company security policies |
|
|
|
|
| Get legal approval for company security policies |
|
|
|
|
| Monitor security policies for compliance |
|
|
|
|
| Deliver regular compliance reports to C-team |
|
|
|
|