Profession ICT security technician

ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.

Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.

Personality Type

  • Realistic / Investigative

Knowledge

  • Web application security threats

    The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP.

  • Procurement of ICT network equipment

    The products available from network equipment providers and methods for selecting and procuring the equipment.

  • ICT networking hardware

    The ICT network equipment or computer networking devices, such as UPS systems, electrical systems, networking facilities and structured cabling systems.

Skills

  • Manage closed-circuit television system

    Oversee a system of cameras inside a facility which transmit a signal to a specific set of display devices.

  • Execute software tests

    Perform tests to ensure that a software product will perform flawlessly under the specified customer requirements, using specialised software tools. Apply software testing techniques and tools in order to identify software defects (bugs) and malfunctions.

  • Use access control software

    Utilise software to define the roles and manage user authentication, privileges and access rights to ICT systems, data and services.

  • Ensure proper document management

    Guarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted documents are not used.

  • Identify ICT system weaknesses

    Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.

  • Estimate duration of work

    Produce accurate calculations on time necessary to fulfil future technical tasks based on past and present information and observations or plan the estimated duration of individual tasks in a given project.

  • Address problems critically

    Identify the strengths and weaknesses of various abstract, rational concepts, such as issues, opinions, and approaches related to a specific problematic situation in order to formulate solutions and alternative methods of tackling the situation.

  • Provide technical documentation

    Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and compliant with defined requirements and standards. Keep documentation up to date.

  • Manage alarm system

    Set up and maintain system for detection of intrusions and unauthorised entries into a facility.

  • Analyse ICT system

    Study the activity and performance of information systems in order to model their usage and weaknesses, specify purpose, architecture and services and discover operations and procedures for accomplishing them most efficiently.

  • Integrate system components

    Select and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system. Apply specific testing techniques to ensure integrity during system integration.

  • Solve ICT system problems

    Identify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.

Optional knowledge and skills

ajax matlab groovy prolog (computer programming) internet of things python (computer programming) haskell visual studio .net erlang swift (computer programming) cisco manage it security compliances comply with legal regulations ict security legislation abap assembly (computer programming) sas language typescript cobol r ruby (computer programming) perl lisp cyber security ml (computer programming) smalltalk (computer programming) objective-c scala microsoft visual c++ sap r3 javascript java (computer programming) ict network security risks common lisp computer programming apl ict encryption scratch (computer programming) organisational resilience install low voltage wiring c# c++ asp.net php execute ict audits openedge advanced business language coffeescript pascal (computer programming) vbscript