Profession ICT disaster recovery analyst
ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, design and develop procedures, documentation and strategies for disaster recovery in order for business functions to continue and recover with a minimal loss of data. They also coordinate the system backups tests and validations.
Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.
- Conventional / Investigative
- Product usage risks analysis
The methods to analyse product associated risks, in possible customer environment, their magnitude, consequences and likely outcomes in order to mitigate them by warning messages, safety instructions and maintenance support.
- ICT problem management techniques
The techniques related to identifying the solutions of the root cause of ICT incidents.
- ICT performance analysis methods
The methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, application times, wait latencies and benchmarking results.
- ICT debugging tools
The ICT tools used to test and debug programs and software code, such as GNU Debugger (GDB), Intel Debugger (IDB), Microsoft Visual Studio Debugger, Valgrind and WinDbg.
- ICT recovery techniques
The techniques for recovering hardware or software components and data, after failure, corruption or damage.
- System backup best practice
The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.
- Build business relationships
Establish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its objectives.
- Manage system security
Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.
- Define security policies
Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.
- Implement ICT recovery system
Create, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.
- Apply company policies
Apply the principles and rules that govern the activities and processes of an organisation.
- Manage IT security compliances
Guide application and fulfillment of relevant industry standards, best practices and legal requirements for information security.
- Develop information security strategy
Create company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.
- Maintain plan for continuity of operations
Update methodology which contains steps to ensure that facilities of an organisation are able to continue operating, in case of broad range of unforeseen events.
- Perform backups
Implement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integrity during system integration and after data loss occurrence.
- Report analysis results
Produce research documents or give presentations to report the results of a conducted research and analysis project, indicating the analysis procedures and methods which led to the results, as well as potential interpretations of the results.
- Manage disaster recovery plans
Prepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.
- Conduct impact evaluation of ICT processes on business
Evaluate the tangible consequences of the implementation of new ICT systems and functions on the current business structure and organisational procedures.
- Identify ICT security risks
Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.
- Optimise choice of ICT solution
Select the appropriate solutions in the field of ICT while taking into account potential risks, benefits and overall impact.