{"id":8342,"date":"2021-11-25T04:23:30","date_gmt":"2021-11-25T04:23:30","guid":{"rendered":"https:\/\/www.temok.com\/blog\/?p=8342"},"modified":"2026-04-20T15:07:27","modified_gmt":"2026-04-20T11:07:27","slug":"system-network-administrator-roles","status":"publish","type":"post","link":"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/","title":{"rendered":"What Are System &#038; Network Administrator Roles?"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span>\r\n<p>As the use of information and communication technologies has spread, profiles of professionals dedicated exclusively to managing these technologies have been born. Today essential for any company. This is why 30 years ago, the figure of the systems administrator was born. System &amp; network administrator roles are mainly to implement, configure, and ensure the correct functioning of computer systems. It carries out tasks such as installing and configuring the different systems, hardware, or software, guaranteeing the best planning about possible growth, ensuring the longest possible use time, avoiding system failures, and stopping production somehow. Everything optimally concerning the demanded requirements.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<p>The profile of the systems administrator has extensive basic knowledge because their field of work is vast. Depending on the sector, services, company, or function, a <a href=\"https:\/\/en.wikipedia.org\/wiki\/System_administrator\" target=\"_blank\" rel=\"noopener\">system administrator<\/a> must perform certain functions; I will mention some of them grouped into sections:<\/p>\r\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69fac071dcb7b\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69fac071dcb7b\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#System_Network_Administrator_Roles\" >System &amp; Network Administrator Roles<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Users_Management\" >Users Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Hardware_Management\" >Hardware Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Software_Administration\" >Software Administration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Prevention\" >Prevention<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Network_Administration\" >Network Administration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Types_of_Networks\" >Types of Networks<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#QoS\" >QoS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Internet_Connection\" >Internet Connection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Network_Security\" >Network Security<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Cybersecurity\" >Cybersecurity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#Prevent_And_Remedy_Disasters\" >Prevent And Remedy Disasters<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.temok.com\/blog\/system-network-administrator-roles\/#How_To_Become_a_System_Administrator_And_Work_From_It\" >How To Become a System Administrator And Work From It?<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"System_Network_Administrator_Roles\"><\/span>System &amp; Network Administrator Roles<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"user\"><span class=\"ez-toc-section\" id=\"Users_Management\"><\/span><strong>Users Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<p>Depending on the industry, users can be the system administrator&#8217;s main problem.<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Assistance must be provided, remotely or in person.<\/li>\r\n<li>Install and configure the programs you need, email (on your computer and\/or your phone).<\/li>\r\n<li>In many cases, they are responsible for the problems that the administrator must solve. Either by incidence, by software or hardware problems, or by human error.<\/li>\r\n<li>It is an excellent idea to be careful against users and limit their actions to not, for example, delete a backup.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"hardware\"><span class=\"ez-toc-section\" id=\"Hardware_Management\"><\/span><strong>Hardware Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Provide hardware according to needs. You have to know the needs and find the most suitable hardware.<\/li>\r\n<li>Maintain it through a life cycle forecast and replace it to avoid unsolvable catastrophes.<\/li>\r\n<li>It is essential to have spare parts for critical parts that may fail if they are not redundant.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"software\"><span class=\"ez-toc-section\" id=\"Software_Administration\"><\/span><strong>Software Administration<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Install and correctly configure the necessary programs, optimize them for the required use, and keep them updated mainly for security and efficiency improvement. However, some updates should be tested before applying them.<\/li>\r\n<li>Know the company&#8217;s needs or the client to propose the best and most appropriate software to meet current and future needs.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong>Also Read:<\/strong> <a title=\"https:\/\/www.blog.temok.com\/linux-system-administration\/\" href=\"https:\/\/www.blog.temok.com\/linux-system-administration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux System Administration Concepts with Essential Skills You Should Have<\/a><\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"prevention\"><span class=\"ez-toc-section\" id=\"Prevention\"><\/span><strong>Prevention<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>A systems administrator must always be thinking ahead. Although, indeed, we cannot modernize all the software we have, either because our company needs to work with software that has become a bit outdated, or due to lack of resources in the hardware spectrum, we must always be prepared, such as for remote jobs, as has currently gone through the pandemic we are experiencing.<\/li>\r\n<li>Forecasting growth, provisioning space, for example, not running out of space on hard drives, not running out of nozzles on switches, increasing or scaling as it grows, but always being forward-looking, if you need 16 more ports, put 32.<\/li>\r\n<li>Automate processes and tasks.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"network\"><span class=\"ez-toc-section\" id=\"Network_Administration\"><\/span><strong>Network Administration<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<p>Install and maintain network access points. Make sure network services are operational. Register, manage, and maintain the devices connected to the network. Maintain networking. In many cases, the tasks and work are those that any hosting technician would carry out.\u00a0<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Networks\"><\/span><strong>Types of Networks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<p>Depending on the size of the networks, they can be categorized into the following:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>LAN =&gt; (Local area network) Local area networks, networks for small and medium enterprises. Even home networks (any home).<\/li>\r\n<li>WAN =&gt; (Wide Area Network) Wide area networks, for large corporations.<\/li>\r\n<li>Others =&gt; Like, for example, the Internet.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"QoS\"><\/span><strong>QoS<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\r\n\r\n\r\n\r\n<p>Quality of service for the users that make up the network.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Internet_Connection\"><\/span><strong>Internet Connection<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\r\n\r\n\r\n\r\n<p>Check that there is always a connection to the network of networks and foresee communication failures with it.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Network_Security\"><\/span><strong>Network Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\r\n\r\n\r\n\r\n<p>Check and guarantee network security, guarantee secure connections, and prevent possible attacks.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"cyber\"><span class=\"ez-toc-section\" id=\"Cybersecurity\"><\/span><strong>Cybersecurity<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Securing the data and the equipment, the first security that your company must have is physical security; you must make sure that no one outside the company touches your devices.<\/li>\r\n<li>Implement a protocol of good practices for users, where use tips are collected.<\/li>\r\n<li>Periodically check that the software used is allowed and is duly updated.<\/li>\r\n<li>Know the data protection law and other aspects related to security and data processing.<\/li>\r\n<li>Plan and schedule backups, and check them daily.<\/li>\r\n<li>Monitor every connected device, including new connections, and critical temperatures, and receive SMS alerts from critical systems and services.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"prevent\"><span class=\"ez-toc-section\" id=\"Prevent_And_Remedy_Disasters\"><\/span><strong>Prevent And Remedy Disasters<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n<p>Acting in the event of a disaster is the primary duty of a systems administrator. Whether it is a &#8220;minor disaster&#8221; such as an internet connection outage, or a fire, the systems administrator acts as life insurance for the company in these cases. He has to be responsible for services that do not depend on him, so he will deal with the telecommunications company or the firefighter in the event of a fire if he considers that he must enter the hard drives.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"howto\"><span class=\"ez-toc-section\" id=\"How_To_Become_a_System_Administrator_And_Work_From_It\"><\/span>How To Become a System Administrator And Work From It?<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>A systems administrator will rarely be out of work. It is a highly demanded profession. It is also a job in the office; perhaps the worst thing is the schedule because, given the\u00a0roles of a systems administrator, he must be available for enough time. Not always &#8220;working or doing tasks.&#8221; Many work on &#8220;guard&#8221; shifts. So that there is always a person available to solve possible incidents.<\/p>\r\n\r\n\r\n\r\n<p>In the world, if you want to work as a systems administrator, you have several possibilities, from professional training to a degree in Computer Science.\u00a0 The most important is the Higher Degree Training Cycle ASIR (Administration of Computer Systems in Network), which will allow you to work in companies of different sectors within the IT department. Performing the functions discussed in this article: installation, maintenance, operation, and support of the computer system and networks.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n<p>It is made up of the following modules:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Implementation of Operating Systems<\/li>\r\n<li>Network Planning and Administration<\/li>\r\n<li>Hardware Basics<\/li>\r\n<li>Database Management<\/li>\r\n<li>Markup languages \u200b\u200band information management systems<\/li>\r\n<li>Training and career counseling<\/li>\r\n<li>Operating Systems Administration<\/li>\r\n<li>Network and Internet Services<\/li>\r\n<li>Implementation of Web Applications<\/li>\r\n<li>Database Management Systems Administration<\/li>\r\n<li>Security and High Availability<\/li>\r\n<li>Company and Entrepreneurial Initiative<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>As well as a final project and 3 months of internships in work centers (companies).<\/p>\r\n\r\n\r\n\r\n<p>I hope you like this article on the figures and roles of a system administrator. You can leave any questions in the comments; I will be happy to help you with them.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span>As the use of information and communication technologies has spread, profiles of professionals dedicated exclusively to managing these technologies have been born. Today essential for any company. This is why 30 years ago, the figure of the systems administrator was born. System &amp; network administrator roles are mainly to implement, configure, and ensure the correct [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":18190,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"pmpro_default_level":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[704],"tags":[512,1290,1292,3740,1287,1289,1288,1291],"class_list":["post-8342","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-servers-and-infrastructure","tag-linux-system-administrator","tag-network-admin-roles","tag-network-administrator-roles","tag-system-network-administrator-roles","tag-system-admin","tag-system-admin-roles","tag-system-administrator","tag-system-administrator-roles","pmpro-has-access"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/blog.temok.com\/wp-content\/uploads\/2021\/11\/What-are-System-Network-Administrator-Roles.jpg?fit=750%2C500&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/posts\/8342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/comments?post=8342"}],"version-history":[{"count":5,"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/posts\/8342\/revisions"}],"predecessor-version":[{"id":14910,"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/posts\/8342\/revisions\/14910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/media\/18190"}],"wp:attachment":[{"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/media?parent=8342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/categories?post=8342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.temok.com\/blog\/wp-json\/wp\/v2\/tags?post=8342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}