Profession ICT security technician

ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.

ICT security technician Jobs: Open positions

Find the job of your dreams on Talent.com, one of the largest job sites worldwide.

Job postings: talent.com

Personality Type

Knowledge

  • Procurement of ICT network equipment

    The products available from network equipment providers and methods for selecting and procuring the equipment.

  • Web application security threats

    The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP (Open Web Application Security Project).

  • ICT networking hardware

    The ICT network equipment or computer networking devices, such as UPS systems, electrical systems, networking facilities and structured cabling systems.

Skills

  • Ensure proper document management

    Guarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted documents are not used.

  • Provide technical documentation

    Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and compliant with defined requirements and standards. Keep documentation up to date.

  • Solve ICT system problems

    Identify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.

  • Manage closed-circuit television system

    Oversee a system of cameras inside a facility which transmit a signal to a specific set of display devices.

  • Integrate system components

    Select and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system. Apply specific testing techniques to ensure integrity during system integration.

  • Identify ICT system weaknesses

    Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.

  • Estimate duration of work

    Produce accurate calculations on time necessary to fulfil future technical tasks based on past and present information and observations or plan the estimated duration of individual tasks in a given project.

  • Use access control software

    Utilise software to define the roles and manage user authentication, privileges and access rights to ICT systems, data and services.

  • Analyse ICT system

    Study the activity and performance of information systems in order to model their usage and weaknesses, specify purpose, architecture and services and discover operations and procedures for accomplishing them most efficiently.

  • Address problems critically

    Identify the strengths and weaknesses of various abstract, rational concepts, such as issues, opinions, and approaches related to a specific problematic situation in order to formulate solutions and alternative methods of tackling the situation.

  • Manage alarm system

    Set up and maintain system for detection of intrusions and unauthorised entries into a facility.

  • Execute software tests

    Perform tests to ensure that a software product will perform flawlessly under the specified customer requirements, using specialised software tools. Apply software testing techniques and tools in order to identify software defects (bugs) and malfunctions.

Optional knowledge and skills

vbscript javascript asp.net internet of things common lisp lisp scratch (computer programming) c++ openedge advanced business language groovy sap r3 ruby (computer programming) manage it security compliances cisco microsoft visual c++ computer programming swift (computer programming) coffeescript comply with legal regulations smalltalk (computer programming) scala visual studio .net sas language python (computer programming) perl pascal (computer programming) execute ict audits java (computer programming) c# objective-c ml (computer programming) install low voltage wiring organisational resilience ict security legislation ajax typescript abap erlang apl matlab ict encryption prolog (computer programming) php haskell r ict network security risks cyber security cobol assembly (computer programming)

Source: Sisyphus ODB