Information Technology Specialist - Fort Collins, United States - Department Of Agriculture

    Default job background
    Full time
    Description

    Summary



    This position is located in USDA/ARS/Rangeland Resources &Systems Research Unit /PA/ Fort Collins, CO.

    In this position you will provide IT support and resource to users pertinent to the Wind Erosion Prediction System (WEPS) and Location IT Specialists on the use of local and ARS IT resources.

    This is a temporary position with a not to exceed date of 12 months and may be extended for up to 1 additional year (24 months of total service).



    Duties

    • Installs and maintains local domain and stand-alone servers.
    • Works as part of a team in maintaining network services, such as Dynamic Host Configuration Protocol (DHCP), Domain Name Server (DNS), File and Point, and other network services.
    • Participates in the performance of Location security assessments focusing on the Accreditation and Authorization process, maintaining OS and application patches on ARS devices, as well as user education.
    • Coordinates delivery of server components to end-users in collaboration with unit network and infrastructure engineers, information security services, and governance administration.
    • Participates in the installation of systems on desktops and laptops, updates Windows, provides operational advice and assistance to users, maintains distribution records, etc.
    • Installs all required applications and utilities and configures each device so that each user's system performs optimally.
    • Participates in demonstrations and training sessions for users on assorted software and/or hardware.
    • Participates in Beta testing of proposed ARS software (e.g., receipt of software, installation, timing/scheduling of tests, data input/output verification, formatting, etc.).
    • Develops security and access processes as dictated by the sensitivity of the data, and exercises control over the Local Area Network System security program (i.e., degree of access, access IDs, passwords, etc.).