Password Protected
Nope
Yep, that's right!
Career Guidance Skills information skills S2.7 - analysing and evaluating information and data S2.7.5 - performing risk analysis and management Identify ICT security risks
Description
Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.
Occupations requiring this skill
This section is generated automatically.
Skill demand overview
- Essential in 6 occupations
- Optional in 2 occupations
- Total: 8 occupations
- Most common in: ISCO major group 2 (Professionals)
Essential for
- Digital forensics expertDigital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted o…
- ICT disaster recovery analystICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, d…
- Ethical hackerEthical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
- ICT security technicianICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…
- ICT resilience managerICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation's cyber security, resilience and disaster recovery. …
- Mobile devices technicianMobile devices technicians carry out proper fault diagnosis to improve the quality of mobile devices and repair them. They provide information related to a number of services, incl…
Optional for
- Database developerDatabase developers program, implement and coordinate changes to computer databases based on their expertise in database management systems. Excludes people performing managerial a…
- IT auditorIT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. The…
Related skills
- ICT network security risks
- ICT security standards
- Assessment of risks and threats
- Web application security threats
- Cyber security
- Manage IT security compliances
- Organisational resilience
- Execute ICT audits
- ICT security legislation
- Levels of software testing
- Cyber attack counter-measures
- Information security strategy
- Manage system security
- ICT infrastructure
Last updated on February 19, 2026
