Summary
Working in a team of infrastructure specialists and engineers, an infrastructure engineer supports and maintains infrastructure solutions and services as directed and according to departmental policy.
At this role level, you will:
• ensure services are delivered and used as required
• work with and support third parties to provide infrastructure services
Background
Description | Background |
---|---|
Has a good knowledge, both theoretical and practical of a wide range of communications systems, networks. Is aware of the technical and economic needs of the business and possesses strong interpersonal skills. | Prior Knowledge and Skills |
Work Activity Components
Title | Details |
---|---|
Logical design (NTDS) (Level Three) | Produces simple logical network designs showing, for example, topologies and components. Identifies and applies common processes. |
Physical design and operational requirements (NTDS) (Level Three) | Translates simple logical designs into physical designs taking account of the target environment and any potential safety-related aspects. |
User interfaces (NTDS) (Level Three) | Applies standard user/system interfaces, including reports, validation and error correction procedures, processing rules, access, security and audit controls, recovery routines and contingency procedures. |
Automation tools (ITOP)(Level Two) | Modifies queuing parameters and job priorities within defined limits, to improve job throughput or the processing of output. |
Incident management (ITOP)(Level Two) | Responds to support calls and enquiries from service desk, users, specialists and others. Takes appropriate action, within defined limits of responsibility or area of specialism, to deal with processing priorities. |
Incidents, problems and disputes(SUPP)(Level Three) | Supports resolution of supplier related incidents, problems, or unsatisfactory performance. Resolves problems, or escalates them to more experienced colleagues. |
Communication and liaison (SUPP)(Level Three) | Acts as routine contact point between organisation and suppliers. |
Supplier performance (SUPP)(Level Three) | Collects, reviews and reports on supplier performance data. |
Behavioural Skills
Title | Details |
---|---|
Attention to Detail | Applying specific quality standards to all tasks undertaken to ensure that deliverables are accurate and complete. |
Teamwork | Working collaboratively with others to achieve a common goal. |
Verbal Expression | Communicating effectively using the spoken word. |
Written Expression | Communicating effectively in writing, such as reports and via emails. |
Technical Skills
Title | Details | Depth |
---|---|---|
Business Continuity Planning | Methods and techniques for risk assessment, business impact analysis, establishment of countermeasures and contingency arrangements relating to the serious disruption of IT services. | Aware of |
Communications Modelling Tools | Tools and techniques (manual or automated) that can be used to plan or document an understanding of the design, structure, relationships and usage of networks. | Aware of |
Corporate, Industry and Professional Standards | Applying relevant standards, practices, codes, and assessment and certification programmes to the specific organisation or business domain. | Aware of |
Infrastructure Architecture | The frameworks and principles on which networks, systems, equipment and resources are based both on premises and cloud-based. | Aware of |
Network Data Security | Network security and threat mitigation, including physical, electronic, firewalling, encryption, access, and authorisation; protecting data at rest and in transit; defending against viruses and malware; the impact of Big Data; and the integration of robust security controls into enterprise services and policies. | Aware of |
Network Traffic Analysis | Methods and techniques for the capture of traffic information (packet level) and the forensic analysis of this information into its constituent elements. | Aware of |
Safe Installation Practice | The knowledge and ability to install and maintain hardware systems to operate within their planned specification in a way that ensures they are safe to use by those authorised to work with them. | Aware of |
Wi-Fi | The principles, functions and operation of WiFi components, routers, hubs and repeaters and the installation of WiFi hot-spots with appropriate use of security and encryption techniques. | Aware of |
Networking and Communications | The planning and management of the interaction between two or more networking systems, computers or other intelligent devices. | Familiar with |
Cloud/Virtualisation | The principles and application of cloud/ virtualisation (including ownership, responsibilities and security implications). Use of tools and systems to manage virtualised environments. | Familiar with |
Configuration Management | The discipline that gives precise control over IT assets and components by recording and maintaining information about the 'configuration items', including hardware devices, computer programs, software licences, documentation, network devices, and data centre facilities (virtualised and static). | Aware of |
Infrastructure/System Security | The security threats and vulnerabilities that impact and/or emanate from system hardware, software and other infrastructure components, and relevant strategies, controls and activities to prevent, mitigate, detect and resolve security incidents affecting system hardware, software and other infrastructure components. | Familiar with |
Operating Systems | System software that controls activities such as input, output, dynamic resource allocation, and error reporting, within the operation of a computer configuration. | Familiar with |
Programming Languages | A set of codes and syntax (supported by software tools) that enables the unambiguous translation of specified functionality into source code for the creation of computer programs. | Familiar with |
Telecommunications Protocols | Rules for the inter-operation of networking components. | Familiar with |
Third Party IT Products and Services | The IT products and/or services supplied to own organisation by external suppliers. | Familiar with |
Other Skills
Title | Details | Depth |
---|---|---|
Contract Management | Methods and techniques for managing contracts to ensure that suppliers adhere to agreed contract requirements. | Aware of |
Service Level Agreements | The purpose and composition of a service level agreement (SLA); the relationship between an SLA, an OLA (Operational Level Agreement) and an underpinning contract for the supply of services. | Familiar with |
Training
Title | Details |
---|---|
Local Area Networks | Features and characteristics of local area networks relevant to installation and support of hardware and software components. |
Program Design Methods and Tools | Programming or system development methods (e.g. structured program design). |
Security Awareness | Tools and techniques to help users and employees understand the role they play in helping to combat information security breaches and for IT and security professionals to prevent and mitigate risk. |
Software Configuration | Installation, configuration and tuning of applications or systems software. |
User Interface Design | Principles, practices, tools and techniques for user interface design and the creation of graphical user interfaces that make user interaction with systems, software, and applications as simple and efficient as possible. |
Wide Area Networks | Features and characteristics of networks configured over a wide area i.e. beyond the geographical boundaries of a single site. |
Professional Development Activity (PDA)
Title | Details | PDA Group |
---|---|---|
Communications | Undertaking learning and practice in oral and written communications, including report writing and presentation. | Developing Professional Skills |
Deputising | Standing in for supervisor or manager on a temporary basis during periods of absence. | Broadening Activities |
Gaining Knowledge of Employing Organisation | Gaining basic knowledge of the employing organisation, its business, structure, culture, policies, products/services, operations and terminology. | Increasing Knowledge |
Gaining Knowledge of Surrounding Technical Areas | Gaining knowledge of IT activities in employing organisation external to own function. | Increasing Knowledge |
Involvement in Professional Body Activities | Attending meetings, seminars and workshops organised by professional body and reading published material, such as journals and web content. | Participation in Professional Activities |
Job Shadowing and Special Assignments | Undertaking temporary periods or secondments in other roles, particularly those that offer a new perspective on own function or exposure to other environments and cultures. | Broadening Activities |
Research Assignments | Exploring a topic which is not part of own normal responsibilities and presenting findings to colleagues and/or management | Increasing Knowledge |
Qualification Components
Title | Awarding Bodies |
---|---|
FEDIP Practitioner | The Federation for Informatics Professionals |
Registered IT Technician (RITTech) | BCS The Chartered Institute for IT |
Government Digital and Data Profession Capability Framework Skills
Skill | Level |
---|---|
Coding and scripting (infrastructure engineer) Coding and scripting involves designing, writing and iterating code and scripts from prototype to production. |
Awareness Coding and scripting (infrastructure engineer) You can: show an awareness of the scripting tools and software that are available and currently in use understand how the internet works |
Information security Information security involves maintaining the security, confidentiality and integrity of information. |
Awareness Information security You can:
|
IT infrastructure IT infrastructure involves ensuring systems and processes are available, adaptable, reliable and secure. |
Working IT infrastructure You can:
|
Modern development standards Modern development standards involves using the latest technologies and best practices to improve the quality of the software development process. |
Working Modern development standards You can:
|
Ownership and initiative |
Working Ownership and initiative You can: own an issue until a new owner has been found or the problem has been mitigated or resolved |
Problem management Problem management involves anticipating and identifying problems in systems, processes or services, and ensuring appropriate solutions are implemented. |
Awareness Problem management You can:
|
Service focus Security technology involves understanding security architectures and identifying vulnerabilities to prevent and respond to cyber breaches. |
Working Service focus You can: take inputs and establish coherent frameworks that work |
Systems design IT systems analysis involves assessing current systems and implementing new ones, to improve the performance and efficiency of an organisation's applications. |
Working Systems design You can: translate logical designs into physical designs produce detailed designs effectively document all work using required standards, methods and tools, including prototyping tools where appropriate design systems characterised by managed levels of risk, manageable business and technical complexity, and meaningful impact work with well understood technology and identify appropriate patterns |
Systems integration Systems integration involves identifying points of connection between different systems and processes, or opportunities to combine them, and designing how the components communicate. |
Working Systems integration You can:
|
Technical understanding |
Working Technical understanding You can: understand the core technical concepts related to the role, and apply them with guidance |
Testing Testing involves ensuring that requirements have been fully met by using appropriate tools and techniques to verify that a product or service works. |
Awareness Testing You can: correctly execute test scripts under supervision understand the role of testing and how it works |
Troubleshooting and problem resolution |
Working Troubleshooting and problem resolution You can: troubleshoot and identify problems across different technology capabilities |
The Professional Body Responsible for this job family is BCS. This job role profile was created in collaboration with BCS, using Role Model Plus.