Profession ICT disaster recovery analyst

ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, design and develop procedures, documentation and strategies for disaster recovery in order for business functions to continue and recover with a minimal loss of data. They also coordinate the system backups tests and validations.

Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.

Personality Type

Knowledge

  • ICT performance analysis methods

    The methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, application times, wait latencies and benchmarking results.

  • ICT problem management techniques

    The techniques related to identifying the solutions of the root cause of ICT incidents.

  • ICT recovery techniques

    The techniques for recovering hardware or software components and data, after failure, corruption or damage.

  • Product usage risks analysis

    The methods to analyse product associated risks, in possible customer environment, their magnitude, consequences and likely outcomes in order to mitigate them by warning messages, safety instructions and maintenance support.

  • System backup best practice

    The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.

  • ICT debugging tools

    The ICT tools used to test and debug programs and software code, such as GNU Debugger (GDB), Intel Debugger (IDB), Microsoft Visual Studio Debugger, Valgrind and WinDbg.

Skills

  • Apply company policies

    Apply the principles and rules that govern the activities and processes of an organisation.

  • Manage IT security compliances

    Guide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.

  • Conduct impact evaluation of ICT processes on business

    Evaluate the tangible consequences of the implementation of new ICT systems and functions on the current business structure and organisational procedures.

  • Manage system security

    Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.

  • Build business relationships

    Establish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its objectives.

  • Optimise choice of ICT solution

    Select the appropriate solutions in the field of ICT while taking into account potential risks, benefits and overall impact.

  • Implement ICT recovery system

    Create, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.

  • Report analysis results

    Produce research documents or give presentations to report the results of a conducted research and analysis project, indicating the analysis procedures and methods which led to the results, as well as potential interpretations of the results.

  • Define security policies

    Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.

  • Identify ICT security risks

    Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.

  • Perform backups

    Implement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integrity during system integration and after data loss occurrence.

  • Manage disaster recovery plans

    Prepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.

  • Maintain plan for continuity of operations

    Update methodology which contains steps to ensure that facilities of an organisation are able to continue operating, in case of broad range of unforeseen events.

  • Develop information security strategy

    Create company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.

Optional knowledge and skills

cyber attack counter-measures software anomalies windows phone levels of software testing manage staff give live presentation mobile operating systems ios android (mobile operating systems) ict communications protocols hardware architectures information security strategy ict process quality models ict network security risks internal risk management policy ict power consumption organisational resilience blackberry network management system tools cyber security unstructured data ict infrastructure

Source: Sisyphus ODB