Manage system security

Description

Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.

Occupations requiring this skill

This section is generated automatically.

Skill demand overview
  • Essential in 6 occupations
  • Optional in 0 occupations
  • Total: 6 occupations
  • Most common in: ISCO major group 2 (Professionals)

Essential for

  • ICT disaster recovery analyst
    ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, d…
  • Ethical hacker
    Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
  • ICT system administrator
    ICT system administrators are responsible for the upkeep, configuration, and reliable operation of computer and network systems, servers, workstations and peripheral devices. They …
  • ICT security technician
    ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…
  • ICT resilience manager
    ICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation's cyber security, resilience and disaster recovery. …
  • Telecommunications engineering technician
    Telecommunications engineering technicians deploy, maintain and monitor a telecommunication system that provides interactions between data and voice communications, such as telepho…

Related skills

 
Last updated on February 18, 2026

Create an account to contribute and get credited

Thousands of people read these job profiles every month.
Add your experience and help make careers clearer for everyone.