Technical Support 2

Job Description Position: Technical Support II Location: Fredericksburg, VA Duration: 5+ months Summary: o This is a technical position in IT Support Services (ITSS) providing computer hardware and software support by configuring, upgrading, and repairing university-owned computers, including desktop and laptops (PC and Mac), printers, mobile devices, software packages, etc. o The individual configures personal computers to access the university wired and wireless Networks. o This position provides in-person, phone-based, or remote support to users following established university and departmental procedures. o They will be responsible for configuring and installing all University-owned systems following all established policies and procedures. o Also will install software on University-owned equipment, adhering to licensing restrictions and policy. o Will be required to work independently with limited supervision to complete all tasks. Education/ Required Skills/Experience o 3-5 years of required experience with: o Demonstrated skills in the troubleshooting and repair of desktop computers, printers and peripherals. o A positive customer-service philosophy. o Good documentation and communication skills. o Considerable experience supporting user technical issues with various computing hardware, software and peripherals including troubleshooting, repairing, installing, upgrading and networking. o Experience connecting devices to wired and wireless networks, Microsoft AD environments. o Experience with Windows and/or Mac operating systems. Preferred: o A+, Network+, Dell, Apple, Crestron or other technical certification(s). o Ability to positively interact with a diverse population including faculty, staff, students, and peers in a higher-education environment. o Demonstrated ability to work effectively as part of a team and individually.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.