Tasks

Common tasks/orders in development, programming and testing of software applications and solutions in Germany, Italy, Serbia and Spain consist of:

  • Strengthening physical and digital security measures for critical infrastructure
  • Implementation of network infrastructures capable of supporting edge computing
  • Design and management of virtual private networks for enhanced security
  • Coordination with network admin
  • Performance tests
  • Configure and connect middle devices (switches, routers, firewalls)
  • Plan and calculate IP networks
  • Design and manage networked communication systems, applying established security policies to ensure required functionality.
  • Configure network hardware and communications devices (routers, switches, and firewalls) for integration into the network infrastructure.
  • Design telematic network diagrams and structures using specific software for efficient communication and data exchange.
  • Configure and manage Layer 2 switches, including port assignment, VLAN configuration, and access control measures to optimize network performance and security
  • Configure and manage Layer 3 devices, including routers, for efficient routing and communication between different network
  • Monitor network and systems performance, analyze logs, and adjust configurations to optimize performance.
  • Identification of customer requirements: collecting information and developing clear business and technical requirements.
  • Analyze of current network Infrastructure: Understand its strengths, weaknesses, and limitations.
  • Creating a network diagram: Develop a visual representation of network (Including devices, connections, and communication paths).
  • Choose hardware and software: Selection of appropriate networking hardware (routers, switches, firewalls, etc.) and software (operating systems, network management tools, security solutions).
  • Design the IP addressing scheme: Planning how IP addresses will be assigned to devices within your network. Decide on IP ranges, subnets, and address allocation. Proper IP addressing ensures efficient communication and routing.
  • Creating a network security plan: Design security measures to protect network (setting up firewalls, access control lists (ACLs), intrusion detection/prevention systems (IDS/IPS), and encryption)
  • Making plan for network support and maintenance: Develop a strategy for ongoing network administration. Define roles, responsibilities, and procedures for monitoring, troubleshooting, and maintaining the network. Regular updates, patches, and backups are essential for network health.

(this is a selection that does not claim to be exhaustive)