Description
ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.
EssentialOptional
Theoretical Knowledge
web application security threatsICT security standardscyber securityICT networking hardwarelevels of software testingsystems development life-cyclepenetration testing tooltools for ICT test automationsecurity engineeringattack vectorsoperating systemsICT system programmingaudit techniquesprocurement of ICT network equipmentcyber attack counter-measuresErlangSmalltalk (computer programming)COBOLICT network security risksVisual BasicHaskellICT encryptionCoffeeScriptRcloud security and complianceObjective-CPerlICT security legislationScalaPython (computer programming)APLSwift (computer programming)VBScriptScratch (computer programming)Pascal (computer programming)Ruby (computer programming)TypeScriptC#ML (computer programming)Prolog (computer programming)organisational resilienceAssembly (computer programming)OpenEdge Advanced Business LanguageGroovyCiscoSAP R3JavaScriptInternet of ThingsABAPPHPJava (computer programming)Common LispMATLABASP.NETSAS languagecloud monitoring and reportingLispAJAXMicrosoft Visual C++computer programmingC++
Practical Skills
engage with stakeholderscommunicate with stakeholdersestablish an ICT security prevention planensure proper document managementestimate duration of workexecute software testsset up cybersecurity training programmesimplement ICT risk managementmanage alarm systemidentify ICT system weaknessesmanage system securityaddress problems criticallymanage closed-circuit television systemintegrate system componentsuse access control softwareidentify ICT security risksanalyse ICT systemsolve ICT system problemsprotect ICT devicesimplement cloud security and complianceimplement anti-virus softwarecooperate with colleaguesexecute ICT auditsimplement ICT security policiescomply with legal regulationsICT safetymanage IT security compliancesinstall low voltage wiringuse back-up and recovery toolsimplement a firewallmanage cloud data and storagemanage keys for data protectionimplement a virtual private networkremove computer virus or malware from a computer