Profession ict disaster recovery analyst
ICT disaster recovery analysts develop, maintain, or implement ICT continuity and disaster recovery strategies and solutions. They focus on risk assessments, business impact analyses, strategy selection, and documentation of business continuity and disaster recovery procedures. They also test system backups and disaster recovery.
Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.
- Conventional / Investigative
- ICT recovery techniques
The techniques for recovering hardware or software components and data, after failure, corruption or damage.
- Product usage risks analysis
The methods to analyse product associated risks, in possible customer environment, their magnitude, consequences and likely outcomes in order to mitigate them by warning messages, safety instructions and maintenance support.
- ICT debugging tools
The ICT tools used to test and debug programs and software code, such as GNU Debugger (GDB), Intel Debugger (IDB), Microsoft Visual Studio Debugger, Valgrind and WinDbg.
- System backup best practice
The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.
- ICT performance analysis methods
The methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, application times, wait latencies and benchmarking results.
- ICT problem management techniques
The techniques related to identifying the solutions of the root cause of ICT incidents.
- Apply company policies
Apply the principles and rules that govern the activities and processes of an organisation.
- Manage system security
Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.
- Identify ICT security risks
Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.
- Manage disaster recovery plans
Prepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.
- Implement ICT recovery system
Create, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.
- Maintain plan for continuity of operations
Update methodology which contains steps to ensure that facilities of an organisation are able to continue operating, in case of broad range of unforeseen events.
- Manage IT security compliances
Guide application and fulfillment of relevant industry standards, best practices and legal requirements for information security.
- Report analysis results
Produce research documents or give presentations to report the results of a conducted research and analysis project, indicating the analysis procedures and methods which led to the results, as well as potential interpretations of the results.
- Perform backups
Implement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integrity during system integration and after data loss occurrence.
- Build business relationships
Establish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its objectives.
- Conduct impact evaluation of ICT processes on business
Evaluate the tangible consequences of the implementation of new ICT systems and functions on the current business structure and organisational procedures.
- Develop information security strategy
Create company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.
- Define security policies
Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.
- Optimise choice of ICT solution
Select the appropriate solutions in the field of ICT while taking into account potential risks, benefits and overall impact.