Description
Cyber incident responders monitor and assess cybersecurity state systems, analysing, evaluating, and mitigating the impact of cybersecurity incidents. Moreover, they identify malicious actors and cyber incidents root causes. According to the organisation’s Incident Response Plan, they restore systems and process functionalities to an operational state, collecting evidence and documenting actions taken.
EssentialOptional
Theoretical Knowledge
ICT network security risksICT security standardscyber securityICT security legislationethical hacking principlesbuilding systems monitoring technologysecurity engineeringincidents and accidents recordingGDPRattack vectorsoperational tactics for emergency responsesoperating systemsrisk managementcyber attack counter-measuressecurity threatsweb application security threatscloud technologiesICT encryptiondefence standard proceduresproject managementcloud security and compliancePython (computer programming)leadership principlesICT project management methodologiesbusiness intelligencelean project managementICT process quality modelsinformation security strategyInternet of ThingsProcess-based managementsafety engineeringinternet governancecopyright legislationcloud monitoring and reportingembedded systemsC++
Practical Skills
engage with stakeholderscreate incident reportscommunicate with stakeholdershandle cybersecurity incidentsICT safetycollect cyber defence dataprovide ICT consulting adviceprotect ICT devicesoptimise choice of ICT solutionprovide informationdevelop information security strategyimplement anti-virus softwareensure proper document managementperform risk analysisimplement ICT security policieslead disaster recovery exercisescreate project specificationsimplement ICT risk managementconsult with business clientstroubleshootperform project managementmanage IT security compliancesmonitor system performanceprotect personal data and privacyimplement a firewallmanage digital identitytrack key performance indicatorsimplement spam protectionmanage a teamensure information securityprovide user documentationdefine quality standardsmanage keys for data protectionimplement a virtual private networkperform scientific researchgive live presentationmanage changes in ICT systemmanage ICT change request processremove computer virus or malware from a computer