Summary
Working in a team of infrastructure specialists and engineers, a senior infrastructure engineer builds, administers, supports and maintains solutions as directed and according to departmental policy.
At this role level, you will:
• ensure services are integrated, delivered and operated as required
• work with and support third parties in providing infrastructure services
• work with technical architects to translate architectural designs into operations
• provide input into overall management - workforce, budget, technology roadmaps, projects and tasks
• lead and direct infrastructure specialist teams in building, managing, supporting and maintaining solutions according to departmental policy (if taking a managerial path)
Background
Description | Background |
---|---|
Has a good knowledge, both theoretical and practical of a wide range of communications systems, networks, software, hardware and supplier services, networking media, services, and facilities. Understands the technical and economic needs of the business, is budget conscious and possesses strong interpersonal skills and knowledge of project management. | Prior Knowledge and Skills |
Work Activity Components
Title | Details |
---|---|
Assessment/selection (NTDS) (Level Four) | Assists in the assessment and selection of suitable networking solutions to meet all or parts of specified requirements. |
Logical design (NTDS) (Level Four) | Produces logical network designs showing for example, processes, objects, topologies and components. Identifies and applies common processes. |
Option evaluation (NTDS) (Level Four) | Obtains and evaluates proposals from suppliers of equipment and software, and other network service providers. |
Physical design and operational requirements (NTDS) (Level Four) | Translates logical designs into physical designs taking account of the target environment and any potential safety-related aspects. |
User interfaces (NTDS) (Level Four) | Specifies user/system interfaces, including reports, validation and error correction procedures, processing rules, access, security and audit controls, recovery routines and contingency procedures. |
Incident management (ITOP)(Level Three) | Responds to calls and enquiries from service desk, users, specialists and others and takes appropriate action, within defined limits of responsibility or area of specialism, to deal with processing priorities. Accepts escalations and initiates support action. |
Automation tools (ITOP)(Level Three) | Uses a wide range of automated tools to maintain operational compliance, deliver configuration and provisioning services, and mitigate threats to the organisation's IT infrastructure and/or data. |
Communication and liaison (SUPP)(Level Four) | Acts as the liaison between the organisation and supplier, both internal and external, owning the contract relationship on behalf of the customer organisation, enabling all communications to take place effectively and efficiently. |
Incidents, problems and disputes (SUPP)(Level Four) | Engages proactively and collaboratively with suppliers to resolve incidents, problems, or unsatisfactory performance. |
Supplier performance (SUPP)(Level Four) | Collects supplier performance data (quantitative and qualitative), and investigates problems. |
Behavioural Skills
Title | Details |
---|---|
Attention to Detail | Applying specific quality standards to all tasks undertaken to ensure that deliverables are accurate and complete. |
Teamwork | Working collaboratively with others to achieve a common goal. |
Technical Skills
Title | Details | Depth |
---|---|---|
Big Data | The discipline associated with data sets so large and/or complex that traditional data processing applications are inadequate. The data files may include structured, unstructured and/or semi-structured data, such as unstructured text, audio, video, etc. Challenges include analysis, capture, curation, search, sharing, storage, transfer, manipulation, analysis, visualization and information privacy. | Aware of |
Business Continuity Planning | Methods and techniques for risk assessment, business impact analysis, establishment of countermeasures and contingency arrangements relating to the serious disruption of IT services. | Aware of |
Communications Modelling Tools | Tools and techniques (manual or automated) that can be used to plan or document an understanding of the design, structure, relationships and usage of networks. | Familiar with |
Corporate, Industry and Professional Standards | Applying relevant standards, practices, codes, and assessment and certification programmes to the specific organisation or business domain. | Aware of |
Infrastructure Architecture | The frameworks and principles on which networks, systems, equipment and resources are based both on premises and cloud-based. | Familiar with |
Network Data Security | Network security and threat mitigation, including physical, electronic, firewalling, encryption, access, and authorisation; protecting data at rest and in transit; defending against viruses and malware; the impact of Big Data; and the integration of robust security controls into enterprise services and policies. | Familiar with |
Network Traffic Analysis | Methods and techniques for the capture of traffic information (packet level) and the forensic analysis of this information into its constituent elements. | Familiar with |
Safe Installation Practice | The knowledge and ability to install and maintain hardware systems to operate within their planned specification in a way that ensures they are safe to use by those authorised to work with them. | Familiar with |
Wi-Fi | The principles, functions and operation of WiFi components, routers, hubs and repeaters and the installation of WiFi hot-spots with appropriate use of security and encryption techniques. | Familiar with |
Networking and Communications | The planning and management of the interaction between two or more networking systems, computers or other intelligent devices. | Proficient in |
Cloud/Virtualisation | The principles and application of cloud/ virtualisation (including ownership, responsibilities and security implications). Use of tools and systems to manage virtualised environments. | Proficient in |
Configuration Management | The discipline that gives precise control over IT assets and components by recording and maintaining information about the 'configuration items', including hardware devices, computer programs, software licences, documentation, network devices, and data centre facilities (virtualised and static). | Aware of |
Infrastructure/System Security | The security threats and vulnerabilities that impact and/or emanate from system hardware, software and other infrastructure components, and relevant strategies, controls and activities to prevent, mitigate, detect and resolve security incidents affecting system hardware, software and other infrastructure components. | Familiar with |
Operating Systems | System software that controls activities such as input, output, dynamic resource allocation, and error reporting, within the operation of a computer configuration. | Familiar with |
Programming Languages | A set of codes and syntax (supported by software tools) that enables the unambiguous translation of specified functionality into source code for the creation of computer programs. | Familiar with |
Telecommunications Protocols | Rules for the inter-operation of networking components. | Familiar with |
Third Party IT Products and Services | The IT products and/or services supplied to own organisation by external suppliers. | Familiar with |
Other Skills
Title | Details | Depth |
---|---|---|
Budgets | Principles, methods, techniques and tools for the preparation and monitoring of budgets to manage costs and ensure cost-effectiveness and value for money. | Aware of |
Project Planning and Control Techniques | Methods and techniques associated with planning and monitoring progress of projects. | Aware of |
Risk Management | Methods and techniques for the assessment and management of business risk. | Aware of |
Techniques for Effective Meetings | Methods and techniques for running effective meetings and for understanding and influencing the roles played by participants. | Aware of |
Coaching Techniques | Methods and techniques for coaching individuals or groups by a balanced combination of support and direction, which could include use of virtual learning environments plus add-ons to augment feedback specific to work items, workflow or career plans. | Aware of |
Contract Management | Methods and techniques for managing contracts to ensure that suppliers adhere to agreed contract requirements. | Familiar with |
Service Level Agreements | The purpose and composition of a service level agreement (SLA); the relationship between an SLA, an OLA (Operational Level Agreement) and an underpinning contract for the supply of services. | Proficient in |
Training
Title | Details |
---|---|
Local Area Networks | Features and characteristics of local area networks relevant to installation and support of hardware and software components. |
Program Design Methods and Tools | Programming or system development methods (e.g. structured program design). |
Security Awareness | Tools and techniques to help users and employees understand the role they play in helping to combat information security breaches and for IT and security professionals to prevent and mitigate risk. |
Software Configuration | Installation, configuration and tuning of applications or systems software. |
User Interface Design | Principles, practices, tools and techniques for user interface design and the creation of graphical user interfaces that make user interaction with systems, software, and applications as simple and efficient as possible. |
Wide Area Networks | Features and characteristics of networks configured over a wide area i.e. beyond the geographical boundaries of a single site. |
Coaching | Concepts, methods and techniques for providing coaching in subject specialisms to individuals or groups (e.g. GROW model). |
Professional Development Activity (PDA)
Title | Details | PDA Group |
---|---|---|
Deputising | Standing in for supervisor or manager on a temporary basis during periods of absence. | Broadening Activities |
Gaining Knowledge of Activities of Employing Organisation | Developing an understanding of the potentially diverse range of activities (service, governance, administrative, regulatory, commercial, charitable, industrial, etc.) undertaken by the employing organisation. | Increasing Knowledge |
Gaining Knowledge of IT Concepts and Techniques | Undertaking study, learning and, where possible, practice in IT concepts and techniques external to own function. | Increasing Knowledge |
Job Shadowing and Special Assignments | Undertaking temporary periods or secondments in other roles, particularly those that offer a new perspective on own function or exposure to other environments and cultures. | Broadening Activities |
Negotiating and Influencing | Undertaking learning and practice of negotiating with and influencing others. | Developing Professional Skills |
Participation in Professional Body Affairs | Taking an active part in professional body affairs at branch, specialist group, committee or board level. | Participation in Professional Activities |
Research Assignments | Exploring a topic which is not part of own normal responsibilities and presenting findings to colleagues and/or management | Increasing Knowledge |
Qualification Components
Title | Awarding Bodies |
---|---|
FEDIP Senior Practitioner | The Federation for Informatics Professionals |
Registered IT Technician (RITTech) | BCS The Chartered Institute for IT |
Government Digital and Data Profession Capability Framework Skills
Skill | Level |
---|---|
Coding and scripting (infrastructure engineer) Coding and scripting involves designing, writing and iterating code and scripts from prototype to production. |
Awareness Coding and scripting (infrastructure engineer) You can: show an awareness of the scripting tools and software that are available and currently in use understand how the internet works |
Information security Information security involves maintaining the security, confidentiality and integrity of information. |
Working Information security You can:
|
IT infrastructure IT infrastructure involves ensuring systems and processes are available, adaptable, reliable and secure. |
Practitioner IT infrastructure You can:
|
Modern development standards Modern development standards involves using the latest technologies and best practices to improve the quality of the software development process. |
Practitioner Modern development standards You can:
|
Ownership and initiative |
Working Ownership and initiative You can: own an issue until a new owner has been found or the problem has been mitigated or resolved |
Problem management Problem management involves anticipating and identifying problems in systems, processes or services, and ensuring appropriate solutions are implemented. |
Working Problem management You can:
|
Service focus Security technology involves understanding security architectures and identifying vulnerabilities to prevent and respond to cyber breaches. |
Working Service focus You can: take inputs and establish coherent frameworks that work |
Systems design IT systems analysis involves assessing current systems and implementing new ones, to improve the performance and efficiency of an organisation's applications. |
Practitioner Systems design You can: design systems characterised by medium levels of risk, impact, and business or technical complexity select appropriate design standards, methods and tools, and ensure they are applied effectively review the systems designs of others to ensure the selection of appropriate technology, efficient use of resources and integration of multiple systems and technology |
Systems integration Systems integration involves identifying points of connection between different systems and processes, or opportunities to combine them, and designing how the components communicate. |
Practitioner Systems integration You can:
|
Technical understanding |
Practitioner Technical understanding You can: show a thorough understanding of the technical concepts required for the role, and can explain how these fit into the wider technical landscape |
Testing Testing involves ensuring that requirements have been fully met by using appropriate tools and techniques to verify that a product or service works. |
Working Testing You can: review requirements and specifications, and define test conditions identify issues and risks associated with work analyse and report test activities and results |
Troubleshooting and problem resolution |
Practitioner Troubleshooting and problem resolution You can: break a problem down into its component parts to identify and diagnose root causes troubleshoot and identify problems across different technology capabilities |
The Professional Body Responsible for this job family is BCS. This job role profile was created in collaboration with BCS, using Role Model Plus.