Technician

Technicians will often be asked these tasks:
- Providing documentation, detailed instructions, drawings, or specifications to tell others about how devices, parts, equipment, or structures are to be fabricated, constructed, assembled, modified, maintained, or used.
- Using computers and computer systems (including hardware and software) to program, write software, set up functions, enter data, or process information.
- Servicing, repairing, calibrating, regulating, fine-tuning, or testing machines, devices, and equipment that operate primarily on the basis of electrical or electronic (not mechanical) principles.
Inspector

Inspectors should be great at:
- Estimating sizes, distances, and quantities; or determining time, costs, resources, or materials needed to perform a work activity.
- Observing, receiving, and otherwise obtaining information from all relevant sources.
- Identifying information by categorizing, estimating, recognizing differences or similarities, and detecting changes in circumstances or events.
- Inspecting equipment, structures, or materials to identify the cause of errors or other problems or defects.
Other work activities related to Information security analysts
- Training users and promoting security awareness for ensuring system security and for improving server and network efficiency.
- Developing plans for safeguarding computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Conferring with users for discussing issues such as computer data access needs, security violations, and programming changes.
- Monitoring current reports of computer viruses for determining when for updating virus protection systems.
- Modifying computer security files for incorporating new software, correcting errors, or changing individual access status.
- Coordinating implementation of computer system plans with establishment personnel and outside vendors.
- Monitoring using of data files and regulating access for safeguarding information in computer files.
- Performing risk assessments and executing tests of data processing system for ensuring functioning of data processing activities and security measures.