Password Protected
Nope
Yep, that's right!
Career Guidance Skills working with computers S5.2 - setting up and protecting computer systems S5.2.2 - protecting ict devices Manage system security
Description
Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.
Occupations requiring this skill
This section is generated automatically.
Skill demand overview
- Essential in 6 occupations
- Optional in 0 occupations
- Total: 6 occupations
- Most common in: ISCO major group 2 (Professionals)
Essential for
- ICT disaster recovery analystICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, d…
- Ethical hackerEthical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
- ICT system administratorICT system administrators are responsible for the upkeep, configuration, and reliable operation of computer and network systems, servers, workstations and peripheral devices. They …
- ICT security technicianICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…
- ICT resilience managerICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation's cyber security, resilience and disaster recovery. …
- Telecommunications engineering technicianTelecommunications engineering technicians deploy, maintain and monitor a telecommunication system that provides interactions between data and voice communications, such as telepho…
Related skills
- Cyber attack counter-measures
- ICT security legislation
- Cyber security
- Solve ICT system problems
- Manage IT security compliances
- Execute ICT audits
- Implement a virtual private network
- Implement ICT risk management
- ICT network security risks
- Organisational resilience
- Identify ICT security risks
- Levels of software testing
- ICT system user requirements
- ICT infrastructure
Last updated on February 18, 2026
