Cyber security

Description

The methods and best practices that protect ICT systems, networks, computers, devices, services, processes and people against unauthorised access, modification and/or denial of service of assets.

Occupations requiring this skill

This section is generated automatically.

Skill demand overview
  • Essential in 7 occupations
  • Optional in 8 occupations
  • Total: 15 occupations
  • Most common in: ISCO major group 2 (Professionals)

Essential for

  • Digital forensics expert
    Digital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted o…
  • ICT auditor manager
    ICT auditor managers monitor ICT auditors responsible for auditing information systems, platforms, and operating procedures in accordance with established corporate standards for e…
  • Ethical hacker
    Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
  • Corporate training manager
    Corporate training managers coordinate all the training activities and development programmes in a company. They also design and develop new training modules and supervise all the …
  • ICT security technician
    ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…
  • ICT resilience manager
    ICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation's cyber security, resilience and disaster recovery. …
  • Environmental engineer
    Environmental engineers integrate environmental and sustainable measures in developing projects of various natures. They seek to preserve natural resources and natural sites. They …

Optional for

  • ICT security administrator
    ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption. Other titles The…
  • ICT disaster recovery analyst
    ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, d…
  • Aviation surveillance and code coordination manager
    Aviation surveillance and code coordination manager ensures that all components of surveillance infrastructures, both ground and airborne, operate in a safe, cohesive and interoper…
  • Supermarket manager
    Supermarket managers are responsible for activities and staff in a supermarket. Other titles The following job titles also refer to supermarket manager: discount supermarket manage…
  • IT auditor
    IT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. The…
  • Webmaster
    Webmasters deploy, maintain, monitor and support a web server to meet service requirements. They ensure optimum system integrity, security, backup and performance. They coordinate …
  • Environmental technician
    Environmental technicians investigate sources of pollution and aid in the development of pollution prevention and environment protection plans. They take samples of soil, water or …
  • Security manager
    Security managers ensure security for people, such as customers and employees, and company's assets either fixed, movable, machines, vehicles, and real state. They ensure safety an…

Related skills

 
Last updated on February 18, 2026

Create an account to contribute and get credited

Thousands of people read these job profiles every month.
Add your experience and help make careers clearer for everyone.