Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

CTS Searches for solid new members to join the team

central logo

Network Technician (full time)

The Network Technician is responsible for onsite network setup, implementation, service and support needs for our customers. This relates to all IP telecommunications technology, VoIP, networks, Wireless and vendor specific hardware and software.

Basic Functions:

  • Network support relating to technical issues involving all network systems.
  • Network systems design and implementation at client locations.
  • Design, implementation, and maintenance of hosted IP telephony, switches, routers, WAPS and gateways.
  • Work with carriers for ordering, installation, and troubleshooting of voice and data circuits.
  • Resolve system alerts and notifications from the remote monitoring and management system through service tickets.
  • Implement and support disaster recovery solutions.
  • Documentation of systems to include system reviews and recommendations.
  • Communication with customers as required: keeping them informed of incident progress, notifying them of impending changes or agreed outages.

Additional Duties and Responsibilities:

  • Improve customer service, perception, and satisfaction.
  • Ability to work in a team and communicate effectively.
  • Escalate service and project issues that cannot be completed within agreed service levels.
  • Communicate to customers: keeping them informed of progress, notifying them of impending changes, agreed outages, etc.
  • Maintain specific knowledge of the customer and how our services relate to their business strategy and goals.
  • Develop in-depth knowledge of the service catalog and how it relates to customer’s needs.
  • Document internal processes and procedures related to duties and responsibilities.
  • Responsible for entering time and expenses in our CMR software as they occur.
  • Work through a daily schedule in our CMR software that has been established through the dispatch process.
  • Enter all work as service or project tickets in our CMR software.
  • Review relevant publications and online materials to remain up-to-date with current and future technologies emerging in the industry.

Knowledge, Skills, and/or Abilities Required:

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Knowledge and expertise in networking systems.
  • Interpersonal skills: such as telephony skills, communication skills, active listening and customer-care.
  • Diagnosis skills of technical issues.
  • Ability to multi-task and adapt to changes quickly.
  • Technical awareness: ability to match resources to technical issues appropriately.
  • Service awareness of all organization’s key services for which support is being provided.
  • Understanding of support tools, techniques, and how technology is used to provide services.
  • Typing skills to ensure quick and accurate entry of service request details.
  • Self-motivated with the ability to work in a fast moving environment.

Salary: $30,000.00 to $40,000.00 /year

 

To be considdered for this position, apply via https://www.indeed.com/

Tech Term: Encryption Key
Have You Really Considered Your Maintenance Costs?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Business Computing Email Privacy Malware Hackers Hosted Solutions IT Services Internet Productivity Managed IT Services Network Security Outsourced IT Data IT Support Software Data Backup Business Mobile Devices Computer Ransomware Microsoft Tech Term Innovation Productivity Backup Data Recovery Hardware Smartphone Managed Service Provider Google Business Continuity Internet of Things Cloud Computing Small Business Data Management Windows 10 Android Disaster Recovery Social Media Remote Monitoring Managed IT User Tips Communication Efficiency Browser Encryption Artificial Intelligence BYOD Paperless Office Windows Smartphones Facebook VoIP IT Support Business Management Workplace Tips Risk Management Phishing Cybersecurity App Save Money Mobile Device Saving Money Government Unified Threat Management Collaboration Recovery Server Gmail BDR Upgrade Network Mobile Device Management Robot Applications Firewall Holiday SaaS Telephone Systems Bandwidth Hosted Solution Document Management Tip of the week Website Money Bring Your Own Device Project Management Data storage Apps Going Green Virtualization Content Filtering Passwords Vendor Management Infrastructure Password Vulnerability Wi-Fi Big Data Office 365 Compliance Chrome Windows 10 IT Management Managed IT Services Regulations Two-factor Authentication Office IT Service Router Politics Work/Life Balance Computers Computing Antivirus Storage Employer-Employee Relationship Automation Healthcare Customer Relationship Management Wireless Data loss Training Data Security Help Desk Customer Service Analytics Remote Computing Managed Service File Sharing Virtual Reality Unified Communications Files Apple Miscellaneous Social Word YouTube Hacker WiFi End of Support Health Redundancy The Internet of Things Tech Support Wireless Technology Legal Maintenance Monitors Smart Technology Quick Tips Scam Administration LiFi Digital Payment Microsoft Office Alert Education VPN Websites Identity Theft IT solutions Patch Management Budget Licensing Information Technology How To Samsung Internet Exlporer Printing HIPAA Remote Monitoring and Management Virtual Private Network Blockchain Sports Outlook Chromebook Mouse Network Management Flexibility Avoiding Downtime Assessment Remote Workers Business Technology Mobile Security communications How To Machine Learning Mobility Google Drive Server Management Settings Uninterrupted Power Supply Business Growth IoT Information Tablet Upgrades Twitter Users Spam Mobile Computing User Error Language Backups High-Speed Internet Search Employees Taxes Display Cyber Monday Drones technology services provider Star Wars Monitoring Superfish Google Maps 3D Printing Downtime Deep Learning Software as a Service Migration Asset Tracking Private Cloud IT Budget Processors Solid State Drive Smart Tech Company Culture Bluetooth Conferencing Office Tips Current Events Operations Spyware MSP Course Data Warehousing Recycling Cyberattacks Proactive IT Cabling Computing Infrastructure Development Shortcut Zero-Day Threat Update Alt Codes Technology Assurance Group ’s 18 Utility Computing Consulting Unsupported Software Virus Point of Sale Electronic Medical Records Technology Tips Chatbots Firefox OneNote Cryptocurrency Net Neutrality Managing Stress Instant Messaging Multi-Factor Security Wearable Technology Proactive Social Engineering USB Virtual Desktop Microsoft Excel Modem eWaste Heating/Cooling Read Only IT Consulting Printer Hacks Alerts WannaCry Cables Telephony Typing Distributed Denial of Service Annual Convention Time Management Managed Services Provider Networking Sync Mobile Data Law Enforcement Best Practice Comparison Identity Employee-Employer Relationship Public Cloud Bitcoin Enterprise Content Management Hacking Finance Dark Data Personal Information Google Calendar Botnet Safety Operating System Cookies Management Servers Data Breach Travel Access Control Cooperation Wires Human Error Managed IT Service San Diego Cost Management E-Commerce Mobile Device Managment Software Tips Disaster Vulnerabilities Trending Authentication Gadget Specifications Connectivity Automobile Computer Care Notifications Marketing Windows 8 Save Time Buisness Legislation IT Technicians WPA3 Mail Merge Black Market Gadgets Identities Permissions Nanotechnology Enterprise Resource Planning Bookmarks Technology Laws SharePoint Staff VoIP Sponsor Permission GPS Writing Emoji Break Fix Social Networking Hard Drive Touchscreen Features Techology Hotspot Geography Authorization Network Congestion Black Friday Google Wallet Roanoke — Central Technology Solutions Consultation Lenovo Unified Threat Management Crowdsourcing Meetings Computer Repair Mirgation Fleet Tracking Address Supercomputer Hard Drives Fraud Google Docs Screen Reader Mobile Statistics Favorites Physical Security Downloads Augmented Reality Humor Digital Obstacle Test Tracking Retail Cortana Dark Web Motherboard Cache Electronic Health Records Disaster Resistance G Suite History Webcam Hard Disk Drive IT Consultant Error Cybercrime Backup and Disaster Recovery Web Server Emergency CrashOverride Printers Cameras Motion Sickness CCTV Administrator Relocation Regulation