Profession ict security administrator

ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.

Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.

Personality Type

  • Conventional / Investigative

Knowledge

  • Database development tools

    The methodologies and tools used for creating logical and physical structure of databases, such as logical data structures, diagrams, modelling methodologies and entity-relationships.

  • Organisational resilience

    The strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by effectively addressing the combined issues of security, preparedness, risk and disaster recovery.

  • Cyber attack counter-measures

    The strategies, techniques and tools that can be used to detect and avert malicious attacks against organisations' information systems, infrastructures or networks.

  • System backup best practice

    The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.

  • Internet of Things

    The general principles, categories, requirements, limitations and vulnerabilities of smart connected devices (most of them with intended internet connectivity).

  • Mobile device management

    The methods for managing the use of mobile devices within an organisation, while ensuring security.

  • Quality assurance methodologies

    Quality assurance principles, standard requirements, and the set of processes and activities used for measuring, controlling and ensuring the quality of products and processes.

  • ICT network security risks

    The security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the consequences of security threats and contingency plans for each security risk factor.

  • Internet governance

    The principles, regulations, norms and programs that shape the evolution and use of internet, such as internet domain names management, registries and registrars, according to ICANN/IANA regulations and recommendations, IP addresses and names, name servers, DNS, TLDs and aspects of IDNs and DNSSEC.

Skills

  • Maintain database security

    Master a wide variety of information security controls in order to pursue maximal database protection.

  • Follow quality standards

    Apply a set of measures and standards concerning the quality of processes or products, ensuring that quality is maintained and improved during work activities.

  • Apply company policies

    Apply the principles and rules that govern the activities and processes of an organisation.

  • Maintain ICT identity management

    Administer identification, authentication and authorisation of individuals within a system and control their access to resources by associating user rights and restrictions with the established identity.

  • Solve ICT system problems

    Identify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.

  • Attend to ICT systems quality

    Ensure correct operations which comply fully with specific needs and outcomes in terms of the development, integration, security and overall management of ICT systems.

  • Identify ICT system weaknesses

    Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.

  • Manage IT security compliances

    Guide application and fulfillment of relevant industry standards, best practices and legal requirements for information security.

  • Interpret technical texts

    Read and understand technical texts that provide information on how to perform a task, usually explained in steps.

  • Perform ICT troubleshooting

    Identify problems with servers, desktops, printers, networks, and remote access, and perform actions which solve the problems.

  • Ensure proper document management

    Guarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted documents are not used.

Optional knowledge and skills

manage database manage ict virtualisation machines build business relationships ict encryption assess ict knowledge cyber security ict infrastructure use scripting programming information security strategy lead disaster recovery exercises address problems critically web application security threats ict security legislation execute software tests perform backups train employees computer forensics information confidentiality ict security standards execute ict audits

Common job titles

  • Correctional service administrator
  • Office & project administrator
  • Associate director, it
  • Ict system suport analyst
  • Ict system administrator
  • Systems administrator
  • Infrastructure support technician
  • Systems admin/programmer v
  • Resident professional services consultant - endpoint