- Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
Occupations with related tasks Save Table: XLSX CSV
- Provide feedback and recommendations to developers on software usability and functionality.
- Identify program deviance from standards, and suggest modifications to ensure compliance.
- Collaborate with field staff or customers to evaluate or diagnose problems and recommend possible solutions.
- Evaluate or recommend software for testing or bug tracking.
- Develop testing programs that address areas such as database impacts, software scenarios, regression testing, negative testing, error or bug retests, or usability.
- Design test plans, scenarios, scripts, or procedures.
- Update automated test scripts to ensure currency.
- Plan test schedules or strategies in accordance with project scope or delivery dates.
- Design or develop automated testing tools.
- Recommend purchase of equipment to control dust, temperature, or humidity in area of system installation.
- Identify, analyze, and document problems with program function, output, online screen, or content.
- Document software defects, using a bug tracking system, and report defects to software developers.
- Document test procedures to ensure replicability and compliance with standards.
- Install, maintain, or use software testing programs.
- Test system modifications to prepare for implementation.
- Create or maintain databases of known test defects.
- Develop or specify standards, methods, or procedures to determine product quality or release readiness.
- Monitor bug resolution efforts and track successes.
- Participate in product design reviews to provide input on functional requirements, product designs, schedules, or potential problems.
- Monitor program performance to ensure efficient and problem-free operations.
- Conduct software compatibility tests with programs, hardware, operating systems, or network environments.
- Investigate customer problems referred by technical support.
- Review software documentation to ensure technical accuracy, compliance, or completeness, or to mitigate risks.
- Perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.
- Install and configure recreations of software production environments to allow testing of software performance.
- Coordinate user or third-party testing.
- Visit beta testing sites to evaluate software performance.
- Conduct historical analyses of test results.
- Modify existing software to correct errors, allow it to adapt to new hardware, or to improve its performance.
- Store, retrieve, and manipulate data for analysis of system capabilities and requirements.
- Provide feedback and recommendations to developers on software usability and functionality.
- Identify program deviance from standards, and suggest modifications to ensure compliance.
- Collaborate with field staff or customers to evaluate or diagnose problems and recommend possible solutions.
- Evaluate or recommend software for testing or bug tracking.
- Develop testing programs that address areas such as database impacts, software scenarios, regression testing, negative testing, error or bug retests, or usability.
- Design test plans, scenarios, scripts, or procedures.
- Update automated test scripts to ensure currency.
- Plan test schedules or strategies in accordance with project scope or delivery dates.
- Design or develop automated testing tools.
- Recommend purchase of equipment to control dust, temperature, or humidity in area of system installation.
- Correct testing-identified problems, or recommend actions for their resolution.
- Identify, standardize, and communicate levels of access and security.
- Recommend Web site improvements, and develop budgets to support recommendations.
- Provide training or technical assistance in Web site implementation or use.
- Evaluate testing routines or procedures for adequacy, sufficiency, and effectiveness.
- Inform Web site users of problems, problem resolutions, or application changes and updates.
- Develop testing routines and procedures.
- Evaluate or recommend server hardware or software.
- Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.
- Identify or document backup or recovery plans.
- Back up or modify applications and related data to provide for disaster recovery.
- Determine sources of Web page or server problems, and take action to correct such problems.
- Implement updates, upgrades, and patches in a timely manner to limit loss of service.
- Implement Web site security measures, such as firewalls or message encryption.
- Collaborate with development teams to discuss, analyze, or resolve usability issues.
- Test issues such as system integration, performance, and system security on a regular schedule or after any major program modifications.
- Perform user testing or usage analyses to determine Web sites' effectiveness or usability.
- Document application and Web site changes or change procedures.
- Track, compile, and analyze Web site usage data.
- Test backup or recovery plans regularly and resolve any problems.
- Review or update Web page content or links in a timely manner, using appropriate tools.
- Install or configure Web server software or hardware to ensure that directory structure is well-defined, logical, and secure, and that files are named properly.
- Gather, analyze, or document user feedback to locate or resolve sources of problems.
- Set up or maintain monitoring tools on Web servers or Web sites.
- Monitor Web developments through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Develop or document style guidelines for Web site content.
- Develop Web site performance metrics.
- Collaborate with Web developers to create and operate internal and external Web sites, or to manage projects, such as e-marketing campaigns.
- Identify or address interoperability requirements.
- Develop or implement procedures for ongoing Web site revision.
- Check and analyze operating system or application log files regularly to verify proper system performance.
- Document installation or configuration procedures to allow maintenance and repetition.
- Test new software packages for use in Web operations or other applications.
- Develop and implement marketing plans for home pages, including print advertising or advertisement rotation.
- Administer internet or intranet infrastructure, including Web, file, and mail servers.
- Correct testing-identified problems, or recommend actions for their resolution.
- Identify, standardize, and communicate levels of access and security.
- Recommend Web site improvements, and develop budgets to support recommendations.
- Provide training or technical assistance in Web site implementation or use.
- Evaluate testing routines or procedures for adequacy, sufficiency, and effectiveness.
- Inform Web site users of problems, problem resolutions, or application changes and updates.
- Develop testing routines and procedures.
- Evaluate or recommend server hardware or software.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
- Confer with network users about solutions to existing system problems.
- Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system.
- Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
- Perform data backups and disaster recovery operations.
- Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
- Configure, monitor, and maintain email applications or virus protection software.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Analyze equipment performance records to determine the need for repair or replacement.
- Design, configure, and test computer hardware, networking software and operating system software.
- Perform routine network startup and shutdown procedures, and maintain control records.
- Load computer tapes and disks, and install software and printer paper or forms.
- Train people in computer system use.
- Maintain logs related to network functions, as well as maintenance and repair records.
- Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
- Coordinate with vendors and with company personnel to facilitate purchases.
- Maintain an inventory of parts for emergency repairs.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
- Confer with network users about solutions to existing system problems.
- Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system.
- Provide advice on project costs, design concepts, or design changes.
- Investigate system component suitability for specified purposes, and make recommendations regarding component use.
- Evaluate existing systems to determine effectiveness, and suggest changes to meet organizational requirements.
- Provide technical guidance or support for the development or troubleshooting of systems.
- Provide customers or installation teams guidelines for implementing secure systems.
- Verify stability, interoperability, portability, security, or scalability of system architecture.
- Develop system engineering, software engineering, system integration, or distributed system architectures.
- Collaborate with engineers or software developers to select appropriate design solutions or ensure the compatibility of system components.
- Identify system data, hardware, or software components required to meet user needs.
- Communicate with staff or clients to understand specific system requirements.
- Research, test, or verify proper functioning of software patches and fixes.
- Perform security analyses of developed or packaged software components.
- Document design specifications, installation instructions, and other system-related information.
- Communicate project information through presentations, technical reports, or white papers.
- Define and analyze objectives, scope, issues, or organizational impact of information systems.
- Monitor system operation to detect potential problems.
- Design and conduct hardware or software tests.
- Evaluate current or emerging technologies to consider factors such as cost, portability, compatibility, or usability.
- Establish functional or system standards to address operational requirements, quality requirements, and design constraints.
- Complete models and simulations, using manual or automated tools, to analyze or predict system performance under different operating conditions.
- Develop or approve project plans, schedules, or budgets.
- Develop efficient and effective system controllers.
- Configure servers to meet functional specifications.
- Direct the analysis, development, and operation of complete computer systems.
- Develop application-specific software.
- Perform ongoing hardware and software maintenance operations, including installing or upgrading hardware or software.
- Direct the installation of operating systems, network or application software, or computer or network hardware.
- Train system users in system operation or maintenance.
- Provide advice on project costs, design concepts, or design changes.
- Investigate system component suitability for specified purposes, and make recommendations regarding component use.
- Evaluate existing systems to determine effectiveness, and suggest changes to meet organizational requirements.
- Provide technical guidance or support for the development or troubleshooting of systems.
- Provide customers or installation teams guidelines for implementing secure systems.
- Make recommendations regarding upgrades, considering implications of new or revised Geographic Information Systems (GIS) software, equipment, or applications.
- Recommend procedures, equipment, or software upgrades to increase data accessibility or ease of use.
- Provide technical expertise in Geographic Information Systems (GIS) technology to clients or users.
- Provide technical support to users or clients regarding the maintenance, development, or operation of Geographic Information Systems (GIS) databases, equipment, or applications.
- Produce data layers, maps, tables, or reports, using spatial analysis procedures or Geographic Information Systems (GIS) technology, equipment, or systems.
- Design or prepare graphic representations of Geographic Information Systems (GIS) data, using GIS hardware or software applications.
- Maintain or modify existing Geographic Information Systems (GIS) databases.
- Perform computer programming, data analysis, or software development for Geographic Information Systems (GIS) applications, including the maintenance of existing systems or research and development for future enhancements.
- Enter data into Geographic Information Systems (GIS) databases, using techniques such as coordinate geometry, keyboard entry of tabular data, manual digitizing of maps, scanning or automatic conversion to vectors, or conversion of other sources of digital data.
- Review existing or incoming data for currency, accuracy, usefulness, quality, or completeness of documentation.
- Perform geospatial data building, modeling, or analysis, using advanced spatial analysis, data manipulation, or cartography software.
- Design or coordinate the development of integrated Geographic Information Systems (GIS) spatial or non-spatial databases.
- Perform integrated or computerized Geographic Information Systems (GIS) analyses to address scientific problems.
- Select cartographic elements needed for effective presentation of information.
- Collect, compile, or integrate Geographic Information Systems (GIS) data, such as remote sensing or cartographic data for inclusion in map manuscripts.
- Interpret aerial or ortho photographs.
- Meet with clients to discuss topics such as technical specifications, customized solutions, or operational problems.
- Document, design, code, or test Geographic Information Systems (GIS) models, internet mapping solutions, or other applications.
- Create, analyze, report, convert, or transfer data, using specialized applications program software.
- Confer with users to analyze, configure, or troubleshoot applications.
- Design, program, or model Geographic Information Systems (GIS) applications or procedures.
- Develop specialized computer software routines, internet-based Geographic Information Systems (GIS) databases, or business applications to customize geographic information.
- Assist users in formulating Geographic Information Systems (GIS) requirements or understanding the implications of alternatives.
- Create visual representations of geospatial data, using complex procedures such as analytical modeling, three-dimensional renderings, or plot creation.
- Transfer or rescale information from original photographs onto maps or other photographs.
- Prepare training materials for, or make presentations to, Geographic Information Systems (GIS) users.
- Apply three-dimensional (3D) or four-dimensional (4D) technologies to geospatial data to allow for new or different analyses or applications.
- Conduct research, data analysis, systems design, or support for software such as Geographic Information Systems (GIS) or Global Positioning Systems (GPS) mapping software.
- Read current literature, talk with colleagues, continue education, or participate in professional organizations or conferences to keep abreast of developments in Geographic Information Systems (GIS) technology, equipment, or systems.
- Make recommendations regarding upgrades, considering implications of new or revised Geographic Information Systems (GIS) software, equipment, or applications.
- Recommend procedures, equipment, or software upgrades to increase data accessibility or ease of use.
- Provide technical expertise in Geographic Information Systems (GIS) technology to clients or users.
- Provide technical support to users or clients regarding the maintenance, development, or operation of Geographic Information Systems (GIS) databases, equipment, or applications.
- Recommend and implement performance improvements.
- Design and implement Web site security measures, such as firewalls and message encryption.
- Communicate with network personnel or Web site hosting agencies to address hardware or software issues affecting Web sites.
- Evaluate or recommend server hardware or software.
- Write supporting code for Web applications or Web sites.
- Design, build, or maintain Web sites, using authoring or scripting languages, content creation tools, management tools, and digital media.
- Back up files from Web sites to local directories for instant recovery in case of problems.
- Select programming languages, design tools, or applications.
- Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.
- Develop databases that support Web applications and Web sites.
- Perform Web site tests according to planned schedules, or after any Web site or product revision.
- Perform or direct Web site updates.
- Maintain understanding of current Web technologies or programming practices through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Analyze user needs to determine technical requirements.
- Respond to user email inquiries, or set up automated systems to send responses.
- Renew domain name registrations.
- Confer with management or development teams to prioritize needs, resolve conflicts, develop content criteria, or choose solutions.
- Collaborate with management or users to develop e-commerce strategies and to integrate these strategies with Web sites.
- Document test plans, testing procedures, or test results.
- Establish appropriate server directory trees.
- Document technical factors such as server load, bandwidth, database performance, and browser and device types.
- Develop or implement procedures for ongoing Web site revision.
- Create Web models or prototypes that include physical, interface, logical, or data models.
- Provide clear, detailed descriptions of Web site specifications, such as product features, activities, software, communication protocols, programming languages, and operating systems software and hardware.
- Monitor security system performance logs to identify problems and notify security specialists when problems occur.
- Install and configure hypertext transfer protocol (HTTP) servers and associated operating systems.
- Research, document, rate, or select alternatives for Web architecture or technologies.
- Develop system interaction or sequence diagrams.
- Incorporate technical considerations into Web site design plans, such as budgets, equipment, performance requirements, and legal issues including accessibility and privacy.
- Recommend and implement performance improvements.
- Design and implement Web site security measures, such as firewalls and message encryption.
- Communicate with network personnel or Web site hosting agencies to address hardware or software issues affecting Web sites.
- Evaluate or recommend server hardware or software.
- Recommend cyber defense software or hardware to support responses to cyber incidents.
- Write cyber defense recommendations, reports, or white papers using research or experience.
- Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
- Adhere to legal policies and procedures related to handling digital media.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Create system images or capture network settings from information technology environments to preserve as evidence.
- Develop plans for investigating alleged computer crimes, violations, or suspicious activity.
- Develop policies or requirements for data collection, processing, or reporting.
- Duplicate digital evidence to use for data recovery and analysis procedures.
- Maintain cyber defense software or hardware to support responses to cyber incidents.
- Maintain knowledge of laws, regulations, policies or other issuances pertaining to digital forensics or information privacy.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Preserve and maintain digital forensic evidence for analysis.
- Recover data or decrypt seized data.
- Write and execute scripts to automate tasks, such as parsing large data files.
- Write reports, sign affidavits, or give depositions for legal proceedings.
- Write technical summaries to report findings.
- Recommend cyber defense software or hardware to support responses to cyber incidents.
- Write cyber defense recommendations, reports, or white papers using research or experience.
- Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
- Evaluate new emerging media or technologies and make recommendations for their application within Internet marketing or search marketing campaigns.
- Assist in the development of online transaction or security policies.
- Identify methods for interfacing Web application technologies with enterprise resource planning or other system software.
- Manage tracking and reporting of search-related activities and provide analyses to marketing executives.
- Optimize digital assets, such as text, graphics, or multimedia assets, for search engine optimization (SEO) or for display and usability on internet-connected devices.
- Collect and analyze Web metrics, such as visits, time on site, page views per visit, transaction volume and revenue, traffic mix, click-through rates, conversion rates, cost per acquisition, or cost per click.
- Participate in the development or implementation of online marketing strategy.
- Optimize Web site exposure by analyzing search engine patterns to direct online placement of keywords or other content.
- Coordinate with developers to optimize Web site architecture, server configuration, or page construction for search engine consumption and optimal visibility.
- Assist in setting up or optimizing analytics tools for tracking visitors' behaviors.
- Identify appropriate Key Performance Indicators (KPIs) and report key metrics from digital campaigns.
- Create content strategies for digital media.
- Combine secondary data sources with keyword research to more accurately profile and satisfy user intent.
- Collaborate with other marketing staff to integrate and complement marketing strategies across multiple sales channels.
- Optimize shopping cart experience or Web site conversion rates against Key Performance Indicators (KPIs).
- Improve search-related activities through ongoing analysis, experimentation, or optimization tests, using A/B or multivariate methods.
- Conduct online marketing initiatives, such as paid ad placement, affiliate programs, sponsorship programs, email promotions, or viral marketing campaigns on social media Web sites.
- Conduct market research analysis to identify search query trends, real-time search and news media activity, popular social media topics, electronic commerce trends, market opportunities, or competitor performance.
- Propose online or multiple-sales-channel campaigns to marketing executives.
- Communicate and collaborate with merchants, Webmasters, bloggers, or online editors to strategically place hyperlinks.
- Identify, evaluate, or procure hardware or software for implementing online marketing campaigns.
- Collaborate with Web, multimedia, or art design staffs to create multimedia Web sites or other internet content that conforms to brand and company visual format.
- Keep abreast of government regulations and emerging Web technology to ensure regulatory compliance by reviewing current literature, talking with colleagues, participating in educational programs, attending meetings or workshops, or participating in professional organizations or conferences.
- Purchase or negotiate placement of listings in local search engines, directories, or digital mapping technologies.
- Coordinate sales or other promotional strategies with merchandising, operations, or inventory control staff to ensure product catalogs are current, accurate, and organized for best findability against user intent.
- Execute or manage social media campaigns to inform search marketing tactics.
- Conduct financial modeling for online marketing programs or Web site revenue forecasting.
- Implement online customer service processes to ensure positive and consistent user experiences.
- Develop transactional Web applications, using Web programming software and knowledge of programming languages, such as hypertext markup language (HTML) and extensible markup language (XML).
- Identify and develop commercial or technical specifications, such as usability, pricing, checkout, or data security, to promote transactional internet-enabled commerce functionality.
- Define product requirements, based on market research analysis, in collaboration with user interface design and engineering staff.
- Execute or manage banner, video, or other non-text link ad campaigns.
- Assist in the evaluation or negotiation of contracts with vendors or online partners.
- Prepare electronic commerce designs or prototypes, such as storyboards, mock-ups, or other content, using graphics design software.
- Execute and manage communications with digital journalists or bloggers.
- Resolve product availability problems in collaboration with customer service staff.
- Evaluate new emerging media or technologies and make recommendations for their application within Internet marketing or search marketing campaigns.
- Assist in the development of online transaction or security policies.
- Identify methods for interfacing Web application technologies with enterprise resource planning or other system software.
- Propose recommendations for improving content management system capabilities.
- Assist in determining document management policies to facilitate efficient, legal, and secure access to electronic content.
- Assist in the development of document or content classification taxonomies to facilitate information capture, search, and retrieval.
- Write, review, or execute plans for testing new or established document management systems.
- Develop or configure document management system features, such as user interfaces, access profiles, and document workflow procedures.
- Consult with end users regarding problems in accessing electronic content.
- Operate data capture technology to import digitized documents into document management system.
- Implement scanning or other automated data entry procedures, using imaging devices and document imaging software.
- Implement electronic document processing, retrieval, and distribution systems in collaboration with other information technology specialists.
- Identify and classify documents or other electronic content according to characteristics such as security level, function, and metadata.
- Develop, document, or maintain standards, best practices, or system usage procedures.
- Administer document and system access rights and revision control to ensure security of system and integrity of master documents.
- Prepare and record changes to official documents and confirm changes with legal and compliance management staff, including enterprise-wide records management staff.
- Monitor regulatory activity to maintain compliance with records and document management laws.
- Retrieve electronic assets from repository for distribution to users, collecting and returning to repository, if necessary.
- Keep abreast of developments in document management technologies and techniques by reviewing current literature, talking with colleagues, participating in educational programs, attending meetings or workshops, or participating in professional organizations or conferences.
- Conduct needs assessments to identify document management requirements of departments or end users.
- Document technical functions and specifications for new or proposed content management systems.
- Exercise security surveillance over document processing, reproduction, distribution, storage, or archiving.
- Prepare support documentation and training materials for end users of document management systems.
- Search electronic sources, such as databases or repositories, or manual sources for information.
- Analyze, interpret, or disseminate system performance data.
- Assist in the assessment, acquisition, or deployment of new electronic document management systems.
- Propose recommendations for improving content management system capabilities.
- Assist in determining document management policies to facilitate efficient, legal, and secure access to electronic content.
- Assist in the development of document or content classification taxonomies to facilitate information capture, search, and retrieval.
- Write, review, or execute plans for testing new or established document management systems.
- Develop or configure document management system features, such as user interfaces, access profiles, and document workflow procedures.
- Consult with end users regarding problems in accessing electronic content.
- Operate data capture technology to import digitized documents into document management system.
- Implement scanning or other automated data entry procedures, using imaging devices and document imaging software.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Provide consultation to nurses regarding hardware or software configuration.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Plan, install, repair, or troubleshoot telehealth technology applications or systems in homes.
- Translate nursing practice information between nurses and systems engineers, analysts, or designers, using object-oriented models or other techniques.
- Apply knowledge of computer science, information science, nursing, and informatics theory to nursing practice, education, administration, or research, in collaboration with other health informatics specialists.
- Design, develop, select, test, implement, and evaluate new or modified informatics solutions, data structures, and decision-support mechanisms to support patients, health care professionals, and their information management and human-computer and human-technology interactions within health care contexts.
- Analyze and interpret patient, nursing, or information systems data to improve nursing services.
- Develop, implement, or evaluate health information technology applications, tools, processes, or structures to assist nurses with data management.
- Identify, collect, record, or analyze data relevant to the nursing care of patients.
- Use informatics science to design or implement health information technology applications for resolution of clinical or health care administrative problems.
- Analyze computer and information technologies to determine applicability to nursing practice, education, administration, and research.
- Read current literature, talk with colleagues, and participate in professional organizations or conferences to keep abreast of developments in informatics.
- Develop or deliver training programs for health information technology, creating operating manuals as needed.
- Disseminate information about nursing informatics science and practice to the profession, other health care professions, nursing students, and the public.
- Design, conduct, or provide support to nursing informatics research.
- Inform local, state, national, and international health policies related to information management and communication, confidentiality and security, patient safety, infrastructure development, and economics.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Provide consultation to nurses regarding hardware or software configuration.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Plan, install, repair, or troubleshoot telehealth technology applications or systems in homes.
- Evaluate processes and technologies, and suggest revisions to increase productivity and efficiency.
- Develop project-specific data management plans that address areas such as coding, reporting, or transfer of data, database locks, and work flow processes.
- Design forms for receiving, processing, or tracking data.
- Develop technical specifications for data management programming and communicate needs to information technology staff.
- Design and validate clinical databases, including designing or testing logic checks.
- Process clinical data, including receipt, entry, verification, or filing of information.
- Generate data queries, based on validation checks or errors and omissions identified during data entry, to resolve identified problems.
- Monitor work productivity or quality to ensure compliance with standard operating procedures.
- Prepare appropriate formatting to data sets as requested.
- Prepare data analysis listings and activity, performance, or progress reports.
- Confer with end users to define or implement clinical system requirements such as data release formats, delivery schedules, and testing protocols.
- Perform quality control audits to ensure accuracy, completeness, or proper usage of clinical systems and data.
- Analyze clinical data using appropriate statistical tools.
- Write work instruction manuals, data capture guidelines, or standard operating procedures.
- Supervise the work of data management project staff.
- Contribute to the compilation, organization, and production of protocols, clinical study reports, regulatory submissions, or other controlled documentation.
- Read technical literature and participate in continuing education or professional associations to maintain awareness of current database technology and best practices.
- Train staff on technical procedures or software program usage.
- Develop or select specific software programs for various research scenarios.
- Provide support and information to functional areas such as marketing, clinical monitoring, and medical affairs.
- Track the flow of work forms, including in-house data flow or electronic forms transfer.
- Evaluate processes and technologies, and suggest revisions to increase productivity and efficiency.
- Develop project-specific data management plans that address areas such as coding, reporting, or transfer of data, database locks, and work flow processes.
- Design forms for receiving, processing, or tracking data.
- Develop technical specifications for data management programming and communicate needs to information technology staff.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Conduct network and security system audits, using established criteria.
- Configure information systems to incorporate principles of least functionality and least access.
- Develop presentations on threat intelligence.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Identify security system weaknesses, using penetration tests.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Provide technical support to junior staff or clients.
- Identify, evaluate and recommend hardware or software technologies to achieve desired database performance.
- Modify existing databases and database management systems or direct programmers and analysts to make changes.
- Plan and install upgrades of database management system software to enhance database performance.
- Specify users and user access levels for each segment of database.
- Test changes to database applications or systems.
- Test programs or databases, correct errors, and make necessary modifications.
- Train users and answer questions.
- Approve, schedule, plan, and supervise the installation and testing of new products and improvements to computer systems, such as the installation of new databases.
- Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
- Write and code logical and physical database descriptions and specify identifiers of database to management system, or direct others in coding descriptions.
- Develop data models describing data elements and how they are used, following procedures and using pen, template, or computer software.
- Select and enter codes to monitor database performance and to create production databases.
- Review procedures in database management system manuals to make changes to database.
- Identify and evaluate industry trends in database systems to serve as a source of information and advice for upper management.
- Review workflow charts developed by programmer analyst to understand tasks computer will perform, such as updating records.
- Revise company definition of data as defined in data dictionary.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Provide technical support to junior staff or clients.
- Identify, evaluate and recommend hardware or software technologies to achieve desired database performance.
- Prepare evaluations of software or hardware, and recommend improvements or upgrades.
- Answer user inquiries regarding computer software or hardware operation to resolve problems.
- Oversee the daily performance of computer systems.
- Set up equipment for employee use, performing or ensuring proper installation of cables, operating systems, or appropriate software.
- Read technical manuals, confer with users, or conduct computer diagnostics to investigate and resolve problems or to provide technical assistance and support.
- Install and perform minor repairs to hardware, software, or peripheral equipment, following design or installation specifications.
- Confer with staff, users, and management to establish requirements for new systems or modifications.
- Enter commands and observe system functioning to verify correct operations and detect errors.
- Maintain records of daily data communication transactions, problems and remedial actions taken, or installation activities.
- Refer major hardware or software problems or defective products to vendors or technicians for service.
- Develop training materials and procedures, or train users in the proper use of hardware or software.
- Inspect equipment and read order sheets to prepare for delivery to users.
- Read trade magazines and technical manuals, or attend conferences and seminars to maintain knowledge of hardware and software.
- Conduct office automation feasibility studies, including workflow analysis, space design, or cost comparison analysis.
- Hire, supervise, and direct workers engaged in special project work, problem-solving, monitoring, and installation of data communication equipment and software.
- Modify and customize commercial programs for internal needs.
- Prepare evaluations of software or hardware, and recommend improvements or upgrades.
- Answer user inquiries regarding computer software or hardware operation to resolve problems.
- Evaluate and recommend upgrades or improvements to existing computerized healthcare systems.
- Write or maintain archived procedures, procedural codes, or queries for applications.
- Assign the patient to diagnosis-related groups (DRGs), using appropriate computer software.
- Compile medical care and census data for statistical reports on diseases treated, surgery performed, or use of hospital beds.
- Design databases to support healthcare applications, ensuring security, performance and reliability.
- Develop in-service educational materials.
- Facilitate and promote activities, such as lunches, seminars, or tours, to foster healthcare information privacy or security awareness within the organization.
- Identify, compile, abstract, and code patient data, using standard classification systems.
- Manage the department or supervise clerical workers, directing or controlling activities of personnel in the medical records department.
- Monitor changes in legislation and accreditation standards that affect information security or privacy in the computerized healthcare system.
- Plan, develop, maintain, or operate a variety of health record indexes or storage and retrieval systems to collect, classify, store, or analyze information.
- Prepare statistical reports, narrative reports, or graphic presentations of information, such as tumor registry data for use by hospital staff, researchers, or other users.
- Protect the security of medical records to ensure that confidentiality is maintained.
- Resolve or clarify codes or diagnoses with conflicting, missing, or unclear information by consulting with doctors or others or by participating in the coding team's regular meetings.
- Retrieve patient medical records for physicians, technicians, or other medical personnel.
- Train medical records staff.
- Evaluate and recommend upgrades or improvements to existing computerized healthcare systems.
- Write or maintain archived procedures, procedural codes, or queries for applications.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Assess blockchain threats, such as untested code and unprotected keys.
- Automate the deployment of software updates over geographically distributed network nodes.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Design and develop blockchain technologies for industries such as finance and music.
- Design and implement dashboard and data visualizations to meet customer reporting needs.
- Design and implement data repositories to integrate data.
- Develop a maintainable code base using object-oriented design principles, practices, or patterns.
- Discuss and plan systems with solution architects, system engineers, or cybersecurity experts to meet customer requirements.
- Discuss data needs with engineers, product managers, or data scientists to identify blockchain requirements.
- Evaluate blockchain processes or risks based on security assessments or control matrix reviews.
- Evaluate new blockchain technologies and vendor products.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Update client and server applications responsible for integration and business logic.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Recommend information security enhancements to management.
- Provide technical support to computer users for installation and use of security products.
- Assess the quality of security controls, using performance indicators.
- Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
- Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
- Coordinate monitoring of networks or systems for security breaches or intrusions.
- Coordinate vulnerability assessments or analysis of information security systems.
- Develop information security standards and best practices.
- Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
- Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
- Develop response and recovery strategies for security breaches.
- Identify or implement solutions to information security problems.
- Identify security system weaknesses, using penetration tests.
- Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
- Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
- Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
- Scan networks, using vulnerability assessment tools to identify vulnerabilities.
- Train staff on, and oversee the use of, information security standards, policies, and best practices.
- Troubleshoot security and network problems.
- Write reports regarding investigations of information security breaches or network evaluations.
- Recommend information security enhancements to management.
- Provide technical support to computer users for installation and use of security products.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Address the relationships of quantities, magnitudes, and forms through the use of numbers and symbols.
- Disseminate research by writing reports, publishing papers, or presenting at professional conferences.
- Maintain knowledge in the field by reading professional journals, talking with other mathematicians, and attending professional conferences.
- Apply mathematical theories and techniques to the solution of practical problems in business, engineering, the sciences, or other fields.
- Develop mathematical or statistical models of phenomena to be used for analysis or for computational simulation.
- Perform computations and apply methods of numerical analysis to data.
- Assemble sets of assumptions, and explore the consequences of each set.
- Develop new principles and new relationships between existing mathematical principles to advance mathematical science.
- Develop computational methods for solving problems that occur in areas of science and engineering or that come from applications in business or industry.
- Conduct research to extend mathematical knowledge in traditional areas, such as algebra, geometry, probability, and logic.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Document computer security and emergency measures policies, procedures, and tests.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
- Monitor use of data files and regulate access to safeguard information in computer files.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
- Train users and promote security awareness to ensure system security and to improve server and network efficiency.
- Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.