Contact Us Today! 1-844-237-4300
2 minutes reading time (433 words)

CTS Searches for solid new members to join the team

central logo

Network Technician (full time)

The Network Technician is responsible for onsite network setup, implementation, service and support needs for our customers. This relates to all IP telecommunications technology, VoIP, networks, Wireless and vendor specific hardware and software.

Basic Functions:

  • Network support relating to technical issues involving all network systems.
  • Network systems design and implementation at client locations.
  • Design, implementation, and maintenance of hosted IP telephony, switches, routers, WAPS and gateways.
  • Work with carriers for ordering, installation, and troubleshooting of voice and data circuits.
  • Resolve system alerts and notifications from the remote monitoring and management system through service tickets.
  • Implement and support disaster recovery solutions.
  • Documentation of systems to include system reviews and recommendations.
  • Communication with customers as required: keeping them informed of incident progress, notifying them of impending changes or agreed outages.

Additional Duties and Responsibilities:

  • Improve customer service, perception, and satisfaction.
  • Ability to work in a team and communicate effectively.
  • Escalate service and project issues that cannot be completed within agreed service levels.
  • Communicate to customers: keeping them informed of progress, notifying them of impending changes, agreed outages, etc.
  • Maintain specific knowledge of the customer and how our services relate to their business strategy and goals.
  • Develop in-depth knowledge of the service catalog and how it relates to customer’s needs.
  • Document internal processes and procedures related to duties and responsibilities.
  • Responsible for entering time and expenses in our CMR software as they occur.
  • Work through a daily schedule in our CMR software that has been established through the dispatch process.
  • Enter all work as service or project tickets in our CMR software.
  • Review relevant publications and online materials to remain up-to-date with current and future technologies emerging in the industry.

Knowledge, Skills, and/or Abilities Required:

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Knowledge and expertise in networking systems.
  • Interpersonal skills: such as telephony skills, communication skills, active listening and customer-care.
  • Diagnosis skills of technical issues.
  • Ability to multi-task and adapt to changes quickly.
  • Technical awareness: ability to match resources to technical issues appropriately.
  • Service awareness of all organization’s key services for which support is being provided.
  • Understanding of support tools, techniques, and how technology is used to provide services.
  • Typing skills to ensure quick and accurate entry of service request details.
  • Self-motivated with the ability to work in a fast moving environment.

Salary: $30,000.00 to $40,000.00 /year


To be considdered for this position, apply via

Tech Term: Encryption Key
Have You Really Considered Your Maintenance Costs?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Malware Email IT Services Productivity Hosted Solutions Hackers Managed IT Services Internet IT Support Software Network Security Outsourced IT Data Mobile Devices Ransomware Microsoft Data Backup Backup Business Computer Tech Term Google Internet of Things Innovation Hardware Data Recovery Smartphone Managed Service Provider Business Continuity Small Business Android Data Management Cloud Computing Windows 10 Remote Monitoring Social Media Managed IT Communication Disaster Recovery Smartphones BYOD Facebook Efficiency Browser Encryption Paperless Office User Tips Artificial Intelligence Productivity Windows VoIP App Risk Management Cybersecurity IT Support Applications Robot Business Management Unified Threat Management Saving Money Recovery Upgrade Mobile Device Management Save Money Phishing Firewall Gmail Mobile Device Compliance Holiday Tip of the week Government Telephone Systems Money SaaS Big Data Network Bring Your Own Device Document Management Data storage Going Green Chrome Infrastructure Vendor Management Bandwidth Password Server Hosted Solution Virtualization BDR Apps Content Filtering Wi-Fi Passwords Office 365 IT Management Virtual Reality Miscellaneous Antivirus Regulations Router Computing Project Management Two-factor Authentication IT Service Unified Communications Employer-Employee Relationship Workplace Tips Collaboration Work/Life Balance Computers Storage Wireless Data loss Vulnerability Data Security Automation Managed Service Website Analytics Remote Computing Training File Sharing Apple Windows 10 Word Upgrades Hacker Sports Social Twitter Files Managed IT Services Redundancy communications Wireless Technology Legal The Internet of Things Quick Tips Scam Tech Support End of Support Health Politics VPN Office Smart Technology Patch Management Budget Digital Payment Monitors Spam Microsoft Office Alert YouTube Information Technology Websites Identity Theft Customer Relationship Management WiFi Printing Virtual Private Network Licensing Outlook Internet Exlporer Mouse Network Management How To Blockchain Samsung Assessment Business Technology HIPAA Administration LiFi How To IoT Education Google Drive Server Management Flexibility Mobile Security Settings Chromebook Uninterrupted Power Supply Business Growth Mobility Avoiding Downtime Help Desk IT solutions Customer Service Mobile Computing Tablet Crowdsourcing Search Fraud Screen Reader MSP Drones Supercomputer Superfish Network Congestion Mirgation Recycling Backups Dark Web Motherboard Development Deep Learning Tracking Downloads Computer Repair Augmented Reality Utility Computing Marketing Solid State Drive G Suite History Bluetooth Buisness Current Events Taxes Spyware Course User Error Physical Security Language Gadgets OneNote Google Maps Proactive IT Retail Cyber Monday Cortana technology services provider Managing Stress Shortcut 3D Printing Smart Tech Proactive Alt Codes Private Cloud IT Budget Display Software as a Service Migration eWaste Cabling Data Warehousing Processors Cables Firefox Operations Healthcare Cryptocurrency Technology Assurance Group ’s 18 Enterprise Content Management Office Tips Maintenance Computing Infrastructure Users Employee-Employer Relationship Heating/Cooling IT Consulting Hacks WannaCry Unsupported Software Net Neutrality Virus Remote Monitoring and Management Typing Time Management Networking Technology Tips Update Chatbots Management Hacking Microsoft Excel Modem Wires Best Practice Multi-Factor Security Electronic Medical Records Wearable Technology Cost Management Bitcoin Social Engineering Distributed Denial of Service USB Annual Convention Vulnerabilities Downtime Telephony Printer Alerts Connectivity Remote Workers Operating System Sync Servers Data Breach Law Enforcement Mobile Data WPA3 Public Cloud Comparison Identity Enterprise Resource Planning Travel Disaster Trending Cookies Botnet Google Calendar Hard Drive Windows 8 Save Time Safety Managed IT Service San Diego Geography Mail Merge Dark Data Access Control Personal Information Cooperation Information Identities Mobile Device Managment Software Tips Technology Laws Gadget VoIP Sponsor Fleet Tracking Virtual Desktop Automobile Computer Care Touchscreen Techology Specifications Mobile Permissions Notifications Nanotechnology Google Wallet Machine Learning Consultation Lenovo Legislation IT Technicians Cache Break Fix Black Market Social Networking High-Speed Internet GPS Address SharePoint Staff Star Wars Hard Drives Google Docs Statistics Humor Digital Obstacle Unified Threat Management Hotspot Asset Tracking Disaster Resistance Writing Black Friday Emoji Roanoke — Central Technology Solutions Company Culture Meetings Relocation Webcam Hard Disk Drive IT Consultant Point of Sale Error Cybercrime Emergency CrashOverride Web Server Cameras Motion Sickness Regulation Monitoring CCTV Administrator