{"schemaVersion":"1.0","exportedAt":"2026-05-15T12:51:09.968Z","occupation":{"soc":"15-1231.00","title":"Computer Network Support Specialists","group":"Computer & Mathematical","sector":"54","jobZone":4,"jobZoneInferred":false},"framework":{"version":"v.26.05","description":"","contextCovered":"This framework covers computer network support practice across corporate LAN/WAN, cloud-hybrid, and multi-site enterprise environments, from entry-level help-desk support through executive-level network strategy and team leadership.","levels":{"emerging":{"label":"Emerging","statements":["Network data backup procedures — execute under direct supervision using established schedules and approved backup software on a corporate LAN environment.","Security access permissions — apply preconfigured group-level settings under supervisor guidance within an enterprise directory system.","Network monitoring software — operate and review alerts under direction to identify flagged anomalies on a managed corporate network.","Basic diagnostic testing tools — use to identify and document common connectivity problems for individual end users in a help-desk setting.","Network support activities — document using standardized templates and ticketing systems under the guidance of senior technicians.","LAN router configuration — assist senior staff in applying baseline configuration settings on routers in a supervised enterprise environment.","Security and firewall software — install using vendor-provided guides and internal runbooks under direct oversight on workstations and servers.","User connectivity problems — troubleshoot common, recurring issues by following established troubleshooting scripts in a help-desk environment.","Technical documentation and knowledge-base articles — read and apply comprehension to resolve Tier 1 incidents in a structured support workflow.","Operating system software — navigate and perform routine network-related tasks within Windows and Linux environments under close supervision."]},"developing":{"label":"Developing","statements":["Scheduled and on-demand network data backups — plan and execute with minimal oversight, verifying data integrity across multiple servers in a mid-sized enterprise environment.","User and group access permissions — configure and audit independently within Active Directory or comparable IAM platforms across departmental systems.","Security breach attempts — analyze event logs using transaction security and virus protection software, and produce incident reports for review by security teams.","Network connectivity issues — diagnose using protocol analyzers and diagnostic testing equipment, resolving problems with reduced escalation in a multi-segment LAN/WAN environment.","Network support activities — document thoroughly in helpdesk and configuration management systems, maintaining accurate records for recurring issues and resolutions.","WAN and LAN routers and switches — configure VLANs, routing protocols, and ACLs using router and switch software in a branch-office or campus network setting.","Network and endpoint security software — install, update, and validate using change management procedures across production environments with limited supervision.","User and user-group connectivity problems — troubleshoot systematically using network monitoring software, applying inductive reasoning to identify root causes in varied network environments.","Systems performance baselines — monitor continuously using network monitoring tools and alert thresholds, escalating meaningful deviations to senior engineers.","Technical findings — communicate clearly in written reports and verbal briefings to both technical peers and non-technical stakeholders in a corporate IT setting."]},"proficient":{"label":"Proficient","statements":["Enterprise network data backup architecture — design, test, and maintain recovery procedures autonomously, ensuring business continuity compliance in a complex multi-site environment.","Role-based access control frameworks — configure and enforce across heterogeneous systems, conducting periodic access reviews and remediating privilege violations in an enterprise network.","Confirmed and attempted network security breaches — investigate, analyze, and report comprehensively using forensic tools and SIEM platforms, producing actionable findings for leadership and compliance teams.","Complex, non-routine networking problems — isolate and resolve using advanced diagnostic testing software and deep systems analysis across WAN, LAN, and cloud-hybrid topologies.","Network change and support documentation — author and maintain authoritative records including network diagrams, configuration baselines, and post-incident reports in configuration management systems.","Enterprise WAN and LAN infrastructure — design and implement router and switch configurations, including redundancy and failover protocols, across geographically distributed networks.","Network security software deployments — lead end-to-end installations and upgrades, validating firewall rule sets and patch compliance across production and DR environments.","Escalated and systemic user connectivity problems — resolve by conducting root-cause analysis and implementing permanent remediation strategies in large-scale enterprise environments.","Emerging networking technologies and threat vectors — evaluate through active learning and independent research, recommending adoption or mitigation strategies to improve network resilience.","Cross-functional project teams — coordinate technical network tasks using project management software, managing timelines and deliverables independently within complex IT programs."]},"advanced":{"label":"Advanced","statements":["Organizational network backup and disaster recovery strategy — define and govern, aligning policies with business continuity objectives and regulatory requirements across the enterprise.","Enterprise-wide access control and zero-trust security policies — architect and champion, directing implementation teams and ensuring compliance with governance frameworks across all business units.","Security breach response and risk posture — lead post-incident reviews and present findings and strategic recommendations to executive leadership, shaping organizational security investment decisions.","Network support diagnostic standards and tooling — establish and continuously improve, setting the methodology by which all tiers of support staff identify and resolve networking issues.","Network documentation standards and knowledge-management culture — institute across the IT organization, ensuring technical accuracy, accessibility, and lifecycle governance for all network assets.","Network infrastructure roadmap — develop and drive, directing the evolution of WAN, LAN, and cloud connectivity architecture to meet long-term organizational scalability and performance goals.","Security software selection and enterprise deployment strategy — evaluate vendors, lead procurement decisions, and oversee deployment governance, balancing protection efficacy with operational continuity.","Support team performance and professional development — mentor and lead network support specialists at all levels, building organizational capability through coaching, training programs, and career pathing.","Cross-departmental IT systems integration — direct the evaluation and adoption of enterprise application integration and web platform solutions, ensuring network architecture supports organizational digital transformation.","IT operations and network support budget — own and manage, allocating resources across staffing, tooling, and infrastructure projects while reporting outcomes and value to senior organizational leadership."]}}},"sources":{"onet":"v30.2 (CC BY 4.0)","crosswalk":"https://skillscrosswalk.com","generator":"LER.me"},"attribution":"© EBSCOed"}