Profession ICT security technician
ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.
ICT security technician Jobs: Open positions
Find the job of your dreams on Talent.com, one of the largest job sites worldwide.Job postings: talent.com
- Procurement of ICT network equipment
The products available from network equipment providers and methods for selecting and procuring the equipment.
- Web application security threats
The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP (Open Web Application Security Project).
- ICT networking hardware
The ICT network equipment or computer networking devices, such as UPS systems, electrical systems, networking facilities and structured cabling systems.
- Ensure proper document management
Guarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted documents are not used.
- Provide technical documentation
Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and compliant with defined requirements and standards. Keep documentation up to date.
- Solve ICT system problems
Identify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.
- Manage closed-circuit television system
Oversee a system of cameras inside a facility which transmit a signal to a specific set of display devices.
- Integrate system components
Select and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system. Apply specific testing techniques to ensure integrity during system integration.
- Identify ICT system weaknesses
Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.
- Estimate duration of work
Produce accurate calculations on time necessary to fulfil future technical tasks based on past and present information and observations or plan the estimated duration of individual tasks in a given project.
- Use access control software
Utilise software to define the roles and manage user authentication, privileges and access rights to ICT systems, data and services.
- Analyse ICT system
Study the activity and performance of information systems in order to model their usage and weaknesses, specify purpose, architecture and services and discover operations and procedures for accomplishing them most efficiently.
- Address problems critically
Identify the strengths and weaknesses of various abstract, rational concepts, such as issues, opinions, and approaches related to a specific problematic situation in order to formulate solutions and alternative methods of tackling the situation.
- Manage alarm system
Set up and maintain system for detection of intrusions and unauthorised entries into a facility.
- Execute software tests
Perform tests to ensure that a software product will perform flawlessly under the specified customer requirements, using specialised software tools. Apply software testing techniques and tools in order to identify software defects (bugs) and malfunctions.
Source: Sisyphus ODB