Cyber security

Description

The methods that protect ICT systems, networks, computers, devices, services, digital information and people against illegal or unauthorised use.

Alternative labels

Skill type

knowledge

Skill reusability level

sector-specific

Relationships with occupations

Essential knowledge

Cyber security is an essential knowledge of the following occupations:

Chief ICT security officer: Chief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all Information Systems and ensure the provision of information availability.
ICT auditor manager: ICT auditor managers monitor ICT auditors responsible for auditing information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. They evaluate ICT infrastructure in terms of risk to the organisation and establish controls to mitigate loss. They determine and recommend improvements in the current risk management controls and in the implementation of system changes or upgrades.
ICT resilience manager: ICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation’s cyber security, resilience and disaster recovery.

Optional knowledge

Cyber security is optional for these occupations. This means knowing this knowledge may be an asset for career advancement if you are in one of these occupations.

ICT security administrator: ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.
ICT disaster recovery analyst: ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, design and develop procedures, documentation and strategies for disaster recovery in order for business functions to continue and recover with a minimal loss of data. They also coordinate the system backups tests and validations.
Ethical hacker: Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.
ICT security manager: ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all or part of a network or system.

ICT security technician: ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.
Supermarket manager: Supermarket managers are responsible for activities and staff in a supermarket.
Operations manager: Operations managers plan, oversee and coordinate the daily operations of production of goods and provision of services. They also formulate and implement company policies and plan the use of human resources and materials.
IT auditor: IT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. They evaluate ICT infrastructure in terms of risk to the organisation and establish controls to mitigate loss. They determine and recommend improvements in the current risk management controls and in the implementation of system changes or upgrades.
Webmaster: Webmasters deploy, maintain, monitor and support a web server to meet service requirements. They ensure optimum system integrity, security, backup and performance. They coordinate the content, quality and style of websites, execute the website strategy and update and add new features to websites.
Security manager: Security managers ensure security for people, such as customers and employees, and company’s assets either fixed, movable, machines, vehicles, and real state. They ensure safety and security by enforcing security policies, keeping track of different events, implementing security protocols, creating emergency response procedures, conducting security evaluations, and supervising security staff members.
 

 


 

References

  1. Cyber security – ESCO

 

Last updated on September 20, 2022

Thinking about your next career move?

Answer a few questions about your jobs and education, and we’ll give you suggestions about your best possible career move. It’s completely free!