IT Specialist-coop
- Configured hardware, devices, and software to set up work stations for employees.
- Managed hardware and software inventory, ensuring timely updates and replacements as needed.
- Maintained servers and systems to keep networks fully operational during peak periods.
- Provided exceptional customer service by promptly addressing problems reported by endusers.
- Walked individuals through basic troubleshooting tasks.
- Suggested software and hardware modifications to reduce lag time and improve overall speed.
- Enhanced system efficiency by implementing and maintaining IT infrastructure upgrades.
- Optimized network performance through regular monitoring and maintenance.
- Led migration projects to modernize legacy systems without disrupting daily operations or compromising security standards.
- Maintained a comprehensive knowledge of current industry trends, developments, tools, or techniques relevant to the role of an IT specialist.
- Performed server backups and changed and replaced backup tapes daily.
- Implemented effective backup systems to ensure data integrity and availability in case of disaster recovery scenarios.
- Explained technical information in clear terms to promote better understanding for non-technical users.
- Collaborated closely with other departments to provide tailored technology solutions that addressed their specific needs or challenges.
- Responded to support requests from end-users and patiently walked individuals through basic troubleshooting tasks.
- Trained employees on new technologies, increasing competency levels across the organization.
- Monitored systems in operation and quickly troubleshot errors.
- Patched software and installed new versions to eliminate security problems and protect data.
- Evaluated emerging technologies for feasibility, cost-effectiveness, and potential value-add to the company''s IT ecosystem.
- Monitored systems in operation and input commands to troubleshoot areas.
- Streamlined technical support process for enhanced user satisfaction and faster issue resolution.
- Secured sensitive data by establishing robust cybersecurity measures and protocols.
- Conducted regular system audits to identify vulnerabilities, weaknesses, or deviations from established policies or procedures.