INFORMATION TECHNOLOGY TECHNICIAN
Job Description and Duties
Under initial close supervision of the Information Technology Manager I the incumbent is assigned as an ITT in the Office of Digital Investigations (ODI). In the capacity of Digital Forensics Technician, the incumbent follows well defined procedures in order to preserve electronically stored information (ESI) in support of investigations and litigation. The technician performs routine tasks in the digital evidence lifecycle including intake, chain of custody, preservation, security, integrity and return. The incumbent will conduct digital forensic activities of a limited scope, utilizing tools and applications including, but not limited to, Encase, FTK, Cellebrite, XRY, WinHex, and WinFE.
The incumbent performs data import and export activities. Performs all social discovery functions per requested depth and terms. Knowledge of office automation software, digital forensics concepts and best practices and evidence handling is required. The technician must effectively and efficiently produce documentation of work in the form of a record of activities performed culminating in a written report. Incumbent must be familiar with computer hardware and peripheral installation and disassembly, basic networking hardware, concepts and tools, electronic discovery concepts, and federal and state laws regarding evidentiary procedures.
This series specification describes nine information technology classifications used to perform a variety of tasks in support of systems and services in the following six domains or closely related emerging information technology fields:
Business Technology Management – The management of information technology resources according to an organization’s priorities and needs including activities such as information technology policy and program development, information technology portfolio management, information technology procurement, service performance management, process reengineering, business analysis, research and development, strategic planning, digital service user experience engagement, content design, and product and delivery strategy.
Client Services – The full lifecycle of end user device solutions including evaluation, configuration, provisioning, training, security, tracking, and support for an end user computing environment.
Information Security Engineering – The security aspects of the initiation, design, development, testing, operation, and defense of information technology data and environments to address sources of disruption, ranging from natural disasters to malicious acts.
Information Technology Project Management – The management or oversight of all phases of the project management and system development life cycles to ensure efficient and effective delivery of a unique information technology product, service, or system.
Software Engineering – The architecture, development, operation, and maintenance of software systems including user research, user centric design, development or configuration, programming, enterprise architecture, service-oriented architecture, testing, and implementation of the business application services.
System Engineering – The architecture, design, configuration, operation and maintenance of systems discovery and planning, design, configure, administer, and sustaining the operation of a defined system. System elements can include network, server, storage, operating system, database, program, hardware, and software.
Description of Series
Allocations to this classification series may incorporate duties from one or more domains of information technology work.
Information Technology Technician
Under initial close supervision, incumbents typically perform routine support tasks within a limited scope typically involving one unit, function or process, following well-defined procedures in the Business Technology Management, Client Services, or Software Engineering domains.
Incumbents may install or repair hardware or peripheral equipment; manage user accounts and technology inventory; resolve client incidents or requests; ensure software/hardware compliance with security policies; create, test, maintain, and deploy desktop products; configure and/or modify software programs; perform data import and export activities; monitor information technology systems to ensure integrity and tune the system to meet performance requirements; troubleshoot routine issues; and other related activities.