I.T. Qualifications
Glossary of TermsPreferred Information Technology Qualifications
Associate or Bachelor’s degree in Information Technology or related field. Directly related experience or certifications may be substituted for the degree requirement.
Deployment, administration, configuration, design, and maintenance experience with any of the following technologies:
- Windows Server (Active Directory, GPOs, DFS, DHCP, DNS/Certificates, LDAP, Authentication)
- Microsoft O365, System Center Configuration Management
- Microsoft Exchange, eDiscovery, Email Security
- Server Configurations, PowerShell, Hyper-V/VMware
- Data Backup, Recovery, Disaster Recovery
- Routers/Switches/Wireless (LAN/WAN, IP Routing, IPsec, NAT, DMZ, MPLS, QoS/CoS)
- Firewalls, VPNs, Web Filtering, IPS/IDS, Event/Logging Processes
- Incident Response, Vulnerability Management, Risk Management, Compliance Processes
- Mobile Device Management
- Endpoint Management (Image Management, Patch Management, Endpoint Security)
- Videoconferencing, Audio Visual (AV) Programming & Presentation, Audio System Programming
- Fax Server, VoIP
- Helpdesk, hardware support, software/operating systems on physical and virtual environments
Preferred Application Software Engineer Qualifications
Bachelor’s degree in Computer Science or related field area and experience in computer system development and modification. Directly related experience may be substituted for the degree requirement.
Design, development, and maintenance experience of internal or external applications with any of the following technologies:
- C# (required), ASP.NET, XML, JavaScript, Web Services, ADO.NET
- Microsoft .NET technologies
- Microsoft Software Applications (DevOps, Visual Studio, SharePoint, Visio, Project)
- SQL Server Builds/Configurations, SQL Server Reporting Services, IIS Management
- Database technologies (SQL)
- Object oriented and web scripting languages (required, may substitute for C# in some cases)
- Testing software releases, UAT, debugging
- Agile Methodology, Software Development Lifecycle (SDLC) familiarity
- Database Security Standards (Encryption, Hashing), Secure Coding Practices
- Project Management Methodologies familiarity
Selection Process:
Some positions may take several weeks to fill. Only applicants whose backgrounds most closely meet the needs of the position may be invited to interview. Requests for a special accommodation to participate in the interview process should be made at the time you are contacted to schedule an interview. The Selection Process may include computer testing and first and/or second round panel interviews.
Pre-employment Requirements
Candidates for this position will be required to submit to a criminal history investigation, fingerprint processing, social network cyber vetting, and drug testing.
To view available positions, please click here.