ICT disaster recovery analyst

Description

ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, design and develop procedures, documentation and strategies for disaster recovery in order for business functions to continue and recover with a minimal loss of data. They also coordinate the system backups tests and validations.

Excludes people performing development activities.

Other titles

The following job titles also refer to ICT disaster recovery analyst:

IT resilience analyst
disaster recovery officer
ICT resilience analysts
business continuity strategist
IT disaster recovery analyst
business continuity analyst

Minimum qualifications

Bachelor’s degree is generally required to work as ICT disaster recovery analyst. However, this requirement may differ in some countries.

ISCO skill level

ISCO skill level is defined as a function of the complexity and range of tasks and duties to be performed in an occupation. It is measured on a scale from 1 to 4, with 1 the lowest level and 4 the highest, by considering:

  • the nature of the work performed in an occupation in relation to the characteristic tasks and duties
  • the level of formal education required for competent performance of the tasks and duties involved and
  • the amount of informal on-the-job training and/or previous experience in a related occupation required for competent performance of these tasks and duties.

ICT disaster recovery analyst is a Skill level 4 occupation.

ICT disaster recovery analyst career path

Similar occupations

These occupations, although different, require a lot of knowledge and skills similar to ICT disaster recovery analyst.

ICT resilience manager
ICT security manager
ICT security administrator
ICT security consultant
ethical hacker

Long term prospects

These occupations require some skills and knowledge of ICT disaster recovery analyst. They also require other skills and knowledge, but at a higher ISCO skill level, meaning these occupations are accessible from a position of ICT disaster recovery analyst with a significant experience and/or extensive training.

Essential knowledge and skills

Essential knowledge

This knowledge should be acquired through learning to fulfill the role of ICT disaster recovery analyst.

System backup best practice: The procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.
Product usage risks analysis: The methods to analyse product associated risks, in possible customer environment, their magnitude, consequences and likely outcomes in order to mitigate them by warning messages, safety instructions and maintenance support.
Ict debugging tools: The ICT tools used to test and debug programs and software code, such as GNU Debugger (GDB), Intel Debugger (IDB), Microsoft Visual Studio Debugger, Valgrind and WinDbg.
Ict problem management techniques: The techniques related to identifying the solutions of the root cause of ICT incidents.
Ict recovery techniques: The techniques for recovering hardware or software components and data, after failure, corruption or damage.
Ict performance analysis methods: The methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, application times, wait latencies and benchmarking results.

Essential skills and competences

These skills are necessary for the role of ICT disaster recovery analyst.

Manage it security compliances: Guide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.
Apply company policies: Apply the principles and rules that govern the activities and processes of an organisation.
Conduct impact evaluation of ict processes on business: Evaluate the tangible consequences of the implementation of new ICT systems and functions on the current business structure and organisational procedures.
Manage system security: Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.
Develop information security strategy: Create company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.
Define security policies: Design and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and data-access constraints.
Optimise choice of ict solution: Select the appropriate solutions in the field of ICT while taking into account potential risks, benefits and overall impact.
Manage disaster recovery plans: Prepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.
Maintain plan for continuity of operations: Update methodology which contains steps to ensure that facilities of an organisation are able to continue operating, in case of broad range of unforeseen events.
Report analysis results: Produce research documents or give presentations to report the results of a conducted research and analysis project, indicating the analysis procedures and methods which led to the results, as well as potential interpretations of the results.
Perform backups: Implement backup procedures to backup data and systems to ensure permanent and reliable system operation. Execute data backups in order to secure information by copying and archiving to ensure integrity during system integration and after data loss occurrence.
Build business relationships: Establish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its objectives.
Implement ict recovery system: Create, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.
Identify ict security risks: Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.

Optional knowledge and skills

Optional knowledge

This knowledge is sometimes, but not always, required for the role of ICT disaster recovery analyst. However, mastering this knowledge allows you to have more opportunities for career development.

Network management system tools: The software or hardware tools which enable monitoring, analysis and supervision of individual network components or network parts within a larger network system.
Internal risk management policy: The internal risk management policies that identify, assess and prioritise risks in an IT environment. The methods used to minimise, monitor and control the possibility and the impact of disastrous events that affect the reaching of business goals.
Information security strategy: The plan defined by a company which sets the information security objectives and measures to mitigate risks, define control objectives, establish metrics and benchmarks while complying with legal, internal and contractual requirements.
Ict network security risks: The security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the consequences of security threats and contingency plans for each security risk factor.
Software anomalies: The deviations of what is standard and exceptional events during software system performance, identification of incidents that can alter the flow and the process of system execution.
Cyber attack counter-measures: The strategies, techniques and tools that can be used to detect and avert malicious attacks against organisations’ information systems, infrastructures or networks.
Ict communications protocols: The system of rules which allow the exchange of information between computers or other devices via computer networks.
Organisational resilience: The strategies, methods and techniques that increase the organisation’s capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by effectively addressing the combined issues of security, preparedness, risk and disaster recovery.
Cyber security: The methods that protect ICT systems, networks, computers, devices, services, digital information and people against illegal or unauthorised use.
Levels of software testing: The levels of testing in the software development process, such as unit testing, integration testing, system testing and acceptance testing.
Windows phone: The system software Windows Phone consists of features, restrictions, architectures and other characteristics of operating systems designed to run on mobile devices.
Mobile operating systems: The features, restrictions, architectures and other characteristics of operating systems designed to run on mobile devices, such as Android or iOS.
Blackberry: The system software BlackBerry consists of features, restrictions, architectures and other characteristics of operating systems designed to run on mobile devices.
Unstructured data: The information that is not arranged in a pre-defined manner or does not have a pre-defined data model and is difficult to understand and find patterns in without using techniques such as data mining.
Ios: The system software iOS consists of features, restrictions, architectures and other characteristics of operating systems designed to run on mobile devices.
Ict infrastructure: The system, network, hardware and software applications and components, as well as devices and processes that are used in order to develop, test, deliver, monitor, control or support ICT services.
Android (mobile operating systems): The system software Android consists of features, restrictions, architectures and other characteristics of operating systems designed to run on mobile devices.
Hardware architectures: The designs laying out the physical hardware components and their interconnections.
Ict power consumption: The energy consumption and types of models of software as well as hardware elements.
Ict process quality models: The quality models for ICT services which address the maturity of the processes, the adoption of recommended practices and their definition and institutionalisation that allow the organisation to reliably and sustainably produce required outcomes. It includes models in a lot of ICT areas.

Optional skills and competences

These skills and competences are sometimes, but not always, required for the role of ICT disaster recovery analyst. However, mastering these skills and competences allows you to have more opportunities for career development.

Manage staff: Manage employees and subordinates, working in a team or individually, to maximise their performance and contribution. Schedule their work and activities, give instructions, motivate and direct the workers to meet the company objectives. Monitor and measure how an employee undertakes their responsibilities and how well these activities are executed. Identify areas for improvement and make suggestions to achieve this. Lead a group of people to help them achieve goals and maintain an effective working relationship among staff.
Give live presentation: Deliver a speech or talk in which a new product, service, idea, or piece of work is demonstrated and explained to an audience.

ISCO group and title

2519 – Software and applications developers and analysts not elsewhere classified

 

 


 

 

References
  1. ICT disaster recovery analyst – ESCO
Last updated on August 8, 2022