Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

CTS Searches for solid new members to join the team

central logo

Network Technician (full time)

The Network Technician is responsible for onsite network setup, implementation, service and support needs for our customers. This relates to all IP telecommunications technology, VoIP, networks, Wireless and vendor specific hardware and software.

Basic Functions:

  • Network support relating to technical issues involving all network systems.
  • Network systems design and implementation at client locations.
  • Design, implementation, and maintenance of hosted IP telephony, switches, routers, WAPS and gateways.
  • Work with carriers for ordering, installation, and troubleshooting of voice and data circuits.
  • Resolve system alerts and notifications from the remote monitoring and management system through service tickets.
  • Implement and support disaster recovery solutions.
  • Documentation of systems to include system reviews and recommendations.
  • Communication with customers as required: keeping them informed of incident progress, notifying them of impending changes or agreed outages.

Additional Duties and Responsibilities:

  • Improve customer service, perception, and satisfaction.
  • Ability to work in a team and communicate effectively.
  • Escalate service and project issues that cannot be completed within agreed service levels.
  • Communicate to customers: keeping them informed of progress, notifying them of impending changes, agreed outages, etc.
  • Maintain specific knowledge of the customer and how our services relate to their business strategy and goals.
  • Develop in-depth knowledge of the service catalog and how it relates to customer’s needs.
  • Document internal processes and procedures related to duties and responsibilities.
  • Responsible for entering time and expenses in our CMR software as they occur.
  • Work through a daily schedule in our CMR software that has been established through the dispatch process.
  • Enter all work as service or project tickets in our CMR software.
  • Review relevant publications and online materials to remain up-to-date with current and future technologies emerging in the industry.

Knowledge, Skills, and/or Abilities Required:

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Knowledge and expertise in networking systems.
  • Interpersonal skills: such as telephony skills, communication skills, active listening and customer-care.
  • Diagnosis skills of technical issues.
  • Ability to multi-task and adapt to changes quickly.
  • Technical awareness: ability to match resources to technical issues appropriately.
  • Service awareness of all organization’s key services for which support is being provided.
  • Understanding of support tools, techniques, and how technology is used to provide services.
  • Typing skills to ensure quick and accurate entry of service request details.
  • Self-motivated with the ability to work in a fast moving environment.

Salary: $30,000.00 to $40,000.00 /year


To be considdered for this position, apply via

Tech Term: Encryption Key
Have You Really Considered Your Maintenance Costs?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Email Hosted Solutions Hackers IT Services Internet Network Security Productivity Managed IT Services Outsourced IT Data Software IT Support Data Backup Productivity Business Mobile Devices Tech Term Innovation Ransomware Computer Hardware Microsoft Backup Data Recovery Google Internet of Things Cloud Computing Small Business Business Continuity Smartphone Managed Service Provider Android Efficiency Disaster Recovery Social Media Data Management Windows 10 Smartphones Remote Monitoring Communication Browser VoIP Encryption Artificial Intelligence Paperless Office Managed IT User Tips Upgrade Save Money Facebook BYOD IT Support Business Management Windows App Cybersecurity Mobile Device Management Mobile Device Risk Management Holiday Workplace Tips Windows 10 Collaboration Phishing Employer-Employee Relationship Server communications BDR Wi-Fi Network Firewall Applications Robot Saving Money Bandwidth Government Bring Your Own Device Unified Threat Management Managed IT Services Passwords Gmail Recovery Infrastructure Big Data Vulnerability Chrome Compliance Office 365 Telephone Systems SaaS Hosted Solution Website Money Data storage Healthcare IT Management Document Management Apps Going Green Content Filtering Vendor Management Tip of the week Wireless Virtualization Scam Antivirus Project Management Password Managed Service Information Help Desk Analytics Remote Computing Training Customer Relationship Management Customer Service Data loss Data Security Virtual Reality Unified Communications Apple File Sharing Miscellaneous Social Regulations Files Router IT Service Two-factor Authentication Office Computing Microsoft Office Computers Politics Storage Work/Life Balance Automation Quick Tips Printing Blockchain Access Control VPN Flexibility Chromebook Mobile Security Patch Management Google Drive IoT Avoiding Downtime Settings Business Growth Virtual Private Network Employees Upgrades Users Machine Learning Network Management Mobility Company Culture Twitter Assessment Business Technology Spam Mobile Computing YouTube Hacker How To WiFi Server Management Tablet Downtime Uninterrupted Power Supply The Internet of Things Wireless Technology Legal End of Support Health Administration Maintenance Education Private Cloud Smart Technology Monitors LiFi Word Alert Tech Support Electronic Medical Records Budget Remote Monitoring and Management Redundancy IT solutions Information Technology Digital Payment Internet Exlporer How To Samsung Operating System Remote Workers Websites Identity Theft Licensing Mouse HIPAA Sports Outlook Permission Law Enforcement Cooperation Marketing Windows 8 Save Time Hard Drive Features Public Cloud Managed IT Service Heating/Cooling San Diego IT Consulting Geography Authorization WannaCry Travel Notifications Gadgets Identities Botnet Specifications Time Management Networking Buisness Favorites Mobile Device Managment Permissions Hacking Software Tips Nanotechnology Black Market Fleet Tracking Procurement Legislation IT Technicians Mobile Google Wallet Test Gadget SharePoint Staff Cache Electronic Health Records Automobile Break Fix Servers Writing Computer Care Social Networking Data Breach Emoji High-Speed Internet Unified Threat Management Hotspot Hard Drives Google Docs Security Cameras Star Wars Monitoring Black Friday Network Congestion Roanoke — Central Technology Solutions Conferencing Disaster Fraud Trending Screen Reader Asset Tracking GPS Mirgation Computer Repair Humor Drones MSP RMM Downloads Augmented Reality Mail Merge Physical Security Backups Recycling Cyberattacks Dark Web Retail Motherboard Technology Laws Cortana Development Zero-Day Threat Crowdsourcing User Error VoIP Meetings Language Sponsor 3D Printing Solid State Drive Remote Worker Utility Computing Consulting Cyber Monday Touchscreen Display Supercomputer technology services provider Techology Deep Learning Managing Stress Instant Messaging G Suite History Smart Tech Processors OneNote Software as a Service Consultation Tracking Migration Lenovo Current Events Alt Codes Proactive Tech Terms Office Tips Taxes Operations Address eWaste Read Only Data Warehousing Statistics Google Maps Cables Backup and Disaster Recovery Digital Computing Infrastructure Obstacle Unsupported Software Virus Cryptocurrency ROI Managed Services Provider IT Budget Technology Assurance Group ’s 18 Disaster Resistance Update Enterprise Content Management Finance Net Neutrality Search Cabling Virtual Desktop Employee-Employer Relationship Technology Tips Chatbots Superfish Microsoft Excel Bluetooth Social Engineering Modem USB Typing Theft Multi-Factor Security Wearable Technology Hacks Management Wires Human Error Printer Spyware Point of Sale Alerts Course Mobile Data Bitcoin Cost Management E-Commerce Distributed Denial of Service Annual Convention Proactive IT Best Practice Vulnerabilities Authentication Shortcut Connectivity Comparison Identity Sync Safety Cookies WPA3 Financial Telephony Google Calendar Firefox Dark Data Personal Information Enterprise Resource Planning Bookmarks Web Server Emergency Regulation CrashOverride Cameras Motion Sickness CCTV Administrator Relocation Webcam IT Consultant Printers Notes Error Hard Disk Drive Cybercrime