Define security policies

Description

Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.

Occupations requiring this skill

This section is generated automatically.

Skill demand overview
  • Essential in 1 occupations
  • Optional in 3 occupations
  • Total: 4 occupations
  • Most common in: ISCO major group 2 (Professionals)

Essential for

  • ICT disaster recovery analyst
    ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, d…

Optional for

  • Ethical hacker
    Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
  • ICT resilience manager
    ICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation's cyber security, resilience and disaster recovery. …
  • Security manager
    Security managers ensure security for people, such as customers and employees, and company's assets either fixed, movable, machines, vehicles, and real state. They ensure safety an…

Related skills

 
Last updated on February 18, 2026

Create an account to contribute and get credited

Thousands of people read these job profiles every month.
Add your experience and help make careers clearer for everyone.