Profession ICT security technician
ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.
Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out.
Personality Type
Knowledge
- Procurement of ICT network equipment
The products available from network equipment providers and methods for selecting and procuring the equipment.
- Web application security threats
The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP (Open Web Application Security Project).
- ICT networking hardware
The ICT network equipment or computer networking devices, such as UPS systems, electrical systems, networking facilities and structured cabling systems.
Skills
- Ensure proper document management
Guarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted documents are not used.
- Provide technical documentation
Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and compliant with defined requirements and standards. Keep documentation up to date.
- Solve ICT system problems
Identify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.
- Manage closed-circuit television system
Oversee a system of cameras inside a facility which transmit a signal to a specific set of display devices.
- Integrate system components
Select and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system. Apply specific testing techniques to ensure integrity during system integration.
- Identify ICT system weaknesses
Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.
- Estimate duration of work
Produce accurate calculations on time necessary to fulfil future technical tasks based on past and present information and observations or plan the estimated duration of individual tasks in a given project.
- Use access control software
Utilise software to define the roles and manage user authentication, privileges and access rights to ICT systems, data and services.
- Analyse ICT system
Study the activity and performance of information systems in order to model their usage and weaknesses, specify purpose, architecture and services and discover operations and procedures for accomplishing them most efficiently.
- Address problems critically
Identify the strengths and weaknesses of various abstract, rational concepts, such as issues, opinions, and approaches related to a specific problematic situation in order to formulate solutions and alternative methods of tackling the situation.
- Manage alarm system
Set up and maintain system for detection of intrusions and unauthorised entries into a facility.
- Execute software tests
Perform tests to ensure that a software product will perform flawlessly under the specified customer requirements, using specialised software tools. Apply software testing techniques and tools in order to identify software defects (bugs) and malfunctions.
Optional knowledge and skills
vbscript javascript asp.net internet of things common lisp lisp scratch (computer programming) c++ openedge advanced business language groovy sap r3 ruby (computer programming) manage it security compliances cisco microsoft visual c++ computer programming swift (computer programming) coffeescript comply with legal regulations smalltalk (computer programming) scala visual studio .net sas language python (computer programming) perl pascal (computer programming) execute ict audits java (computer programming) c# objective-c ml (computer programming) install low voltage wiring organisational resilience ict security legislation ajax typescript abap erlang apl matlab ict encryption prolog (computer programming) php haskell r ict network security risks cyber security cobol assembly (computer programming)Source: Sisyphus ODB