Profession ICT disaster recovery analyst

ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, design and develop procedures, documentation and strategies for disaster recovery in order for business functions to continue and recover with a minimal loss of data. They also coordinate the system backups tests and validations.

Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.

Personality Type

  • Conventional / Investigative

Knowledge

  • Product usage risks analysis

    The methods to analyse product associated risks, in possible customer environment, their magnitude, consequences and likely outcomes in order to mitigate them by warning messages, safety instructions and maintenance support.

  • ICT problem management techniques

    The techniques related to identifying the solutions of the root cause of ICT incidents.

  • ICT performance analysis methods

    The methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, application times, wait latencies and benchmarking results.

  • ICT debugging tools

    The ICT tools used to test and debug programs and software code, such as GNU Debugger (GDB), Intel Debugger (IDB), Microsoft Visual Studio Debugger, Valgrind and WinDbg.

  • ICT recovery techniques

    The techniques for recovering hardware or software components and data, after failure, corruption or damage.

  • System backup best practice

    The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.

Skills

  • Build business relationships

    Establish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its objectives.

  • Manage system security

    Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.

  • Define security policies

    Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.

  • Implement ICT recovery system

    Create, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.

  • Apply company policies

    Apply the principles and rules that govern the activities and processes of an organisation.

  • Manage IT security compliances

    Guide application and fulfillment of relevant industry standards, best practices and legal requirements for information security.

  • Develop information security strategy

    Create company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.

  • Maintain plan for continuity of operations

    Update methodology which contains steps to ensure that facilities of an organisation are able to continue operating, in case of broad range of unforeseen events.

  • Perform backups

    Implement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integrity during system integration and after data loss occurrence.

  • Report analysis results

    Produce research documents or give presentations to report the results of a conducted research and analysis project, indicating the analysis procedures and methods which led to the results, as well as potential interpretations of the results.

  • Manage disaster recovery plans

    Prepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.

  • Conduct impact evaluation of ICT processes on business

    Evaluate the tangible consequences of the implementation of new ICT systems and functions on the current business structure and organisational procedures.

  • Identify ICT security risks

    Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.

  • Optimise choice of ICT solution

    Select the appropriate solutions in the field of ICT while taking into account potential risks, benefits and overall impact.

Optional knowledge and skills

give live presentation blackberry android (mobile operating systems) software anomalies ict power consumption organisational resilience unstructured data windows phone hardware architectures ios internal risk management policy ict infrastructure mobile operating systems cyber security levels of software testing manage staff information security strategy ict network security risks cyber attack counter-measures ict communications protocols ict process quality models network management system tools