Recent Searches
MASCO Code
3511-15
Compare
Information Technology Assistant
STEM
Information Technology Assistant typically provide general support and assistance to IT professionals or departments within an organization. Their responsibilities may vary depending on the specific needs of the IT department and the organization's size and structure.
Alternative Names
Tasks
Providing administrative support to the IT department, such as managing calendars, scheduling meetings, and maintaining records.
Responding to IT helpdesk inquiries and routing tickets to appropriate personnel for resolution.
Assisting with IT procurement processes, including purchasing hardware, software, and supplies.
  • M
    Professional, Scientific And Technical Activities
  • 0611
    Information Technology and Information System
  • 0612
    Software Engineering
  • 0614
    Computer Use
  • 0688
    Inter-Disciplinary Programmes and Qualifications Involving Information and Communication Technologies
Skills
Asas
Active Listening
Proficiency in giving full attention to what other people are saying, taking time to understand the points being made and asking questions as appropriate.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. 
Decision Making
proficiency in choosing between two or more alternatives.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Active Learning
Proficiency in applying new knowledge. 
Khusus
Food Safety
proficiency in food handling, preparation, and storage practices that preserve food quality to prevent contamination and food-borne diseases.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Network Administration
proficiency in administering and managing the computer networks of one or many organisations.
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
Center Image