Profession ICT disaster recovery analyst
ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, design and develop procedures, documentation and strategies for disaster recovery in order for business functions to continue and recover with a minimal loss of data. They also coordinate the system backups tests and validations.
ICT disaster recovery analyst Jobs: Open positions
Find the job of your dreams on Talent.com, one of the largest job sites worldwide.Job postings: talent.com
- ICT performance analysis methods
The methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, application times, wait latencies and benchmarking results.
- ICT problem management techniques
The techniques related to identifying the solutions of the root cause of ICT incidents.
- ICT recovery techniques
The techniques for recovering hardware or software components and data, after failure, corruption or damage.
- Product usage risks analysis
The methods to analyse product associated risks, in possible customer environment, their magnitude, consequences and likely outcomes in order to mitigate them by warning messages, safety instructions and maintenance support.
- System backup best practice
The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.
- ICT debugging tools
The ICT tools used to test and debug programs and software code, such as GNU Debugger (GDB), Intel Debugger (IDB), Microsoft Visual Studio Debugger, Valgrind and WinDbg.
- Apply company policies
Apply the principles and rules that govern the activities and processes of an organisation.
- Manage IT security compliances
Guide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.
- Conduct impact evaluation of ICT processes on business
Evaluate the tangible consequences of the implementation of new ICT systems and functions on the current business structure and organisational procedures.
- Manage system security
Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.
- Build business relationships
Establish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its objectives.
- Optimise choice of ICT solution
Select the appropriate solutions in the field of ICT while taking into account potential risks, benefits and overall impact.
- Implement ICT recovery system
Create, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.
- Report analysis results
Produce research documents or give presentations to report the results of a conducted research and analysis project, indicating the analysis procedures and methods which led to the results, as well as potential interpretations of the results.
- Define security policies
Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.
- Identify ICT security risks
Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.
- Perform backups
Implement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integrity during system integration and after data loss occurrence.
- Manage disaster recovery plans
Prepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.
- Maintain plan for continuity of operations
Update methodology which contains steps to ensure that facilities of an organisation are able to continue operating, in case of broad range of unforeseen events.
- Develop information security strategy
Create company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.
Optional knowledge and skillscyber attack counter-measures software anomalies windows phone levels of software testing manage staff give live presentation mobile operating systems ios android (mobile operating systems) ict communications protocols hardware architectures information security strategy ict process quality models ict network security risks internal risk management policy ict power consumption organisational resilience blackberry network management system tools cyber security unstructured data ict infrastructure
Source: Sisyphus ODB