Profession ICT security administrator
ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.
ICT security administrator Jobs: Open positions
Find the job of your dreams on Talent.com, one of the largest job sites worldwide.Job postings: talent.com
- ICT network security risks
The security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the consequences of security threats and contingency plans for each security risk factor.
- Database development tools
The methodologies and tools used for creating logical and physical structure of databases, such as logical data structures, diagrams, modelling methodologies and entity-relationships.
- Organisational resilience
The strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by effectively addressing the combined issues of security, preparedness, risk and disaster recovery.
- Quality assurance methodologies
Quality assurance principles, standard requirements, and the set of processes and activities used for measuring, controlling and ensuring the quality of products and processes.
- Mobile device management
The methods for managing the use of mobile devices within an organisation, while ensuring security.
- System backup best practice
The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.
- Internet governance
The principles, regulations, norms and programs that shape the evolution and use of internet, such as internet domain names management, registries and registrars, according to ICANN/IANA regulations and recommendations, IP addresses and names, name servers, DNS, TLDs and aspects of IDNs and DNSSEC.
- Cyber attack counter-measures
The strategies, techniques and tools that can be used to detect and avert malicious attacks against organisations' information systems, infrastructures or networks.
- Internet of Things
The general principles, categories, requirements, limitations and vulnerabilities of smart connected devices (most of them with intended internet connectivity).
- Solve ICT system problems
Identify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.
- Ensure proper document management
Guarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted documents are not used.
- Attend to ICT systems quality
Ensure correct operations which comply fully with specific needs and outcomes in terms of the development, integration, security and overall management of ICT systems.
- Maintain database security
Master a wide variety of information security controls in order to pursue maximal database protection.
- Apply company policies
Apply the principles and rules that govern the activities and processes of an organisation.
- Manage IT security compliances
Guide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.
- Maintain ICT identity management
Administer identification, authentication and authorisation of individuals within a system and control their access to resources by associating user rights and restrictions with the established identity.
- Identify ICT system weaknesses
Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.
- Interpret technical texts
Read and understand technical texts that provide information on how to perform a task, usually explained in steps.
- Perform ICT troubleshooting
Identify problems with servers, desktops, printers, networks, and remote access, and perform actions which solve the problems.
Optional knowledge and skillsict security legislation lead disaster recovery exercises build business relationships execute ict audits execute software tests perform backups information confidentiality use scripting programming ict security standards manage ict virtualisation machines ict infrastructure computer forensics information security strategy assess ict knowledge web application security threats address problems critically train employees ict encryption manage database cyber security
Source: Sisyphus ODB