Barcelona City Council | Capital humàBarcelona City Council website

Home  > Job profiles

Get to know this occupation

Other denominations

Computer system protection installer/operator
Computer system and Internet access protection mechanisms installer/operator


Computer system and internet access protection mechanism installers perform tasks to assist the computer system and telecommunications security administrator. They are responsible for field tasks and install and maintain and company's systems.


  • Analyse network traffic. This analysis serves to know what use is given to applications, what type of information is used most and what volume it has.
  • Identify the type of network, i.e., see what type of network is installed in the company: identify if it is a local area network (LAN) or a wide area network (WAN), what type of protocol it uses to communicate within the network and with other networks (TCP/IP, etc.), and what type of connection it has (cable, PSTN, etc.).
  • Identify the services and applications that the network offers. Must first know what type of services can be used and what users are defined to then be able to configure and size the systems.
  • Conduct an analysis of the vulnerabilities the system may have, i.e., identify its weaknesses in order to find solutions.
  • Configure the systems, i.e., the different applications that are used in the company so that users can use them. There are applications that all users use, such as text editor, spreadsheets, etc., and there are also applications that are solely for a group of users, who are the only ones that can use them, such as accounting programmes.
  • Size the systems: define the measures of hardware, such as UPS (uninterrupted power system), that depends on the amount of material connected. UPS allows the system to continue working when there are blackouts, for example.
  • Perform tunning: adjust the operating parameters of the system (such as the email of users) or balance resources according to uses (for example, make sure there is not an overloaded printer and a printer no one uses).
  • Install and manage access control mechanisms and assess measures taken to ensure that every user can only access resources assigned to him or her and to prevent entry of unauthorised persons. For example, data on a company's purchases and sales are restricted information; therefore, it is necessary to define who can access this information, and the operator is in charge of doing so.
  • Install and manage monitoring mechanisms. To be able to carry out the various assigned tasks, operators must have continuous information of several system parameters, such as memory usage, the transmission of information over the network, the volume of transactions, etc. There are applications that allow automatic monitoring.
  • Install and manage redundancy mechanisms. Redundancy is a mechanism to protect system data that is intended to keep copies of data in the event of loss.
  • Install and manage error or disaster recovery mechanisms. When a contingency occurs with the system and applications are lost (data or all information is partially or totally lost), operators recover them and fix errors based on established procedures for each case.
  • Install and manage mechanisms to guarantee data confidentiality. Implement the policy defined by the company to protect data, such as the definition of different user levels, access to certain areas of the company, etc.

Quick access and copyright:

Centre per al desenvolupament professional Porta22

Barcelona Treball (Porta22)
Llacuna, 156-162, 08018 Barcelona

Monday to Friday from 9 to 18 h

Generalitat de Catalunya
Unió Europea FEDER
Unió Europea FSE