Recent Searches
MASCO Code
3512-15
Compare
Technical Support Technician
STEM
Technical Support Technician diagnosing and repairing faults, resolving network issues, and installing and configuring hardware and software.
Alternative Names
Tasks
preparing equipment for staff use, performing or ensuring proper installation of cables, operating systems, or appropriate software
Diagnose and repair faults
Troubleshooting technical issues
Identifying hardware and software solutions
overseeing the daily performance of communication and computer systems
  • M
    Professional, Scientific And Technical Activities
  • IT-121-4:2011
    Database Programming
  • M749-006-4:2021
    Statistical Data Management
  • 0611
    Information Technology and Information System
  • 0688
    Inter-Disciplinary Programmes and Qualifications Involving Information and Communication Technologies
Skills
Asas
Active Listening
Proficiency in giving full attention to what other people are saying, taking time to understand the points being made and asking questions as appropriate.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. 
Decision Making
proficiency in choosing between two or more alternatives.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Active Learning
Proficiency in applying new knowledge. 
Khusus
Working with Computers
ability to use computers and other digital tools to develop, install and maintain ICT software and infrastructure.
Food Safety
proficiency in food handling, preparation, and storage practices that preserve food quality to prevent contamination and food-borne diseases.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Network Administration
proficiency in administering and managing the computer networks of one or many organisations.
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
Center Image