Job ID: NC-620440 (96990127)
Desktop Support Engineer with servicenow (must), networking, imaging, data/user profile migration and peripherals installation experience
Location: Charlotte, NC (NCDOT)
Duration: 12 months
Interview:In Person or Webcam.
Skills Required:
Skilled in different types of computer hardware, software, peripherals and components, networking protocols and communications. Required 7 Years
Installing and imaging new computers and loading of appropriate software for customers. Required 7 Years
Installing local and network printers and other peripherals and configuration of same. Required 7 Years
Migrating data and user profiles. Required 7 Years
Documenting process and procedures related to technical field support activities. Required 7 Years
Demonstrates knowledge and a working experience with ServiceNow call tracking system. Required 7 Years
Project Management –
Ability to lead projects that require directing the work of others and with some latitude on actions or decisions. Leads team efforts and assesses and integrates the skills and strengths of individuals for project and organizational success. Provides status on project work to management.
Develop and maintain appropriate documentation for all responsible areas –
This position is responsible for creating and maintaining all documentation of process and procedures for all areas this position is responsible for. This documentation is to be used by team members for operational standards of daily work. This documentation will also be used in accordance with Operational Level Agreements (IT internal) and Service Level Agreements (IT external). All documentation should be reviewed annually.
System Security – It is the responsibility of all Technical Services Staff to be aware of DOT and ITS security policies, as well as the security issues directly affecting the systems and technology for which this position is directly involved. This position is responsible for implementing requirements of the IT Security Office and protecting data from unauthorized access, alteration, destruction, or usage in a manner inconsistent with covered IT Security Policies and standards.