Infocomm TechnologyInformation and communications techniciansISCO 3512
ICT security technician
ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (34)
systems development life-cyclesystems development life-cycleThe sequence of steps, such as planning, creating, testing and deploying and the models for the development and life-cycle management of a system.procurement of ICT network equipmentprocurement of ICT network equipmentThe products available from network equipment providers and methods for selecting and procuring the equipment.ICT security standardsICT security standardsBest practices and guidelines established for securing information and communication technology (ICT) systems and data. Standards as is the case of ISO 27000 series, provide a framework for implementi...attack vectorsattack vectorsPaths or methods that threat actors use to exploit vulnerabilities in information networks or systems from a concrete organisation and impact its availability, integrity and confidentiality. Attack ve...cyber attack counter-measurescyber attack counter-measuresMethods, technologies and techniques used to defend (detect, monitor and recover) against cyber attacks. These cyber attacks include several attack vectors such as malware, denial of service (DoS) att...audit techniquesaudit techniquesThe techniques and methods that support a systematic and independent examination of data, policies, operations and performances using computer-assisted audit tools and techniques (CAATs) such as sprea...security engineeringsecurity engineeringInterdisciplinary field of study that focuses on the realisation of secure systems and the technology to protect individuals or information from malice, errors, or unauthorized access. It involves def...tools for ICT test automationtools for ICT test automationThe specialised software to execute or control tests and compare predicted testing outputs with actual testing results such as Selenium, QTP and LoadRunner.cyber securitycyber securityThe methods and best practices that protect ICT systems, networks, computers, devices, services, processes and people against unauthorised access, modification and/or denial of service of assets.levels of software testinglevels of software testingThe levels of testing in the software development process, such as unit testing, integration testing, system testing and acceptance testing.web application security threatsweb application security threatsThe attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP.ICT system programmingICT system programmingThe methods and tools required to develop system software, specifications of system architectures and interfacing techniques between network and system modules and components.penetration testing toolpenetration testing toolThe specialised ICT tools which test security weaknesses of the system for potentially unauthorised access to system information such as Metasploit, Burp suite and Webinspect.operating systemsoperating systemsThe features, restrictions, architectures and other characteristics of operating systems such Linux, Windows, MacOS, etc.ICT networking hardwareICT networking hardwareThe ICT network equipment or computer networking devices, such as UPS systems, electrical systems, networking facilities and structured cabling systems.establish an ICT security prevention planestablish an ICT security prevention planDefine a comprehensive and proactive strategy for managing information and communication technology (ICT) security risks by establishing a set of measures and responsibilities to ensure the confidenti...manage alarm systemmanage alarm systemSet up and maintain system for detection of intrusions and unauthorised entries into a facility.manage system securitymanage system securityAnalyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and imple...communicate with stakeholderscommunicate with stakeholdersFacilitate communication between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its obj...set up cybersecurity training programmesset up cybersecurity training programmesDesign, develop and deliver educational activities (such as lectures and cyber ranges) to cover needs and/or raise awareness on cybersecurity.use access control softwareuse access control softwareUtilise software to define the roles and manage user authentication, privileges and access rights to ICT systems, data and services.implement ICT risk managementimplement ICT risk managementDevelop and implement procedures for identifying, assessing, treating and mitigating ICT risks, such as hacks or data leaks, according to the company's risk strategy, procedures and policies. Analyse ...analyse ICT systemanalyse ICT systemAnalyse the functioning and performance of information systems in order to define their goals, architecture and services and set procedures and operations to meet end users requirements.execute software testsexecute software testsPerform tests to ensure that a software product will perform flawlessly under the specified customer requirements and identify software defects (bugs) and malfunctions, using specialised software tool...engage with stakeholdersengage with stakeholdersUse a variety of processes that result in mutually negotiated agreements, shared understandings and consensus building. Build partnerships within the work context.solve ICT system problemssolve ICT system problemsIdentify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.manage closed-circuit television systemmanage closed-circuit television systemOversee a system of cameras inside a facility which transmit a signal to a specific set of display devices.address problems criticallyaddress problems criticallyIdentify the strengths and weaknesses of various abstract, rational concepts, such as issues, opinions, and approaches related to a specific problematic situation in order to formulate solutions and a...ensure proper document managementensure proper document managementGuarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted docu...identify ICT system weaknessesidentify ICT system weaknessesAnalyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks. Execute diagnostic operations on cybe...protect ICT devicesprotect ICT devicesProtect devices and digital content, and understand risks and threats in digital environments. Know about safety and security measures and have due regard to reliability and privacy. Make use of tools...estimate duration of workestimate duration of workProduce accurate calculations on time necessary to fulfil future technical tasks based on past and present information and observations or plan the estimated duration of individual tasks in a given pr...integrate system componentsintegrate system componentsSelect and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system.identify ICT security risksidentify ICT security risksApply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and eval...
Optional (61)
ICT safetyICT safetyPersonal protection, data protection, digital identity protection, security measures, safe and sustainable use.HaskellHaskellThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Haskell.ErlangErlangThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Erlang.SAS languageSAS languageThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in SAS language.Ruby (computer programming)Ruby (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Ruby.Common LispCommon LispThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Common Lisp.LispLispThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Lisp.Visual BasicVisual BasicThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Visual Basic.Java (computer programming)Java (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Java.cloud security and compliancecloud security and complianceCloud security and compliance concepts, including shared responsibility model, cloud access management capabilities, and resources for security support.computer programmingcomputer programmingThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms (e.g. object oriented programming, functional programming) a...Prolog (computer programming)Prolog (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Prolog.ICT network security risksICT network security risksThe security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the con...OpenEdge Advanced Business LanguageOpenEdge Advanced Business LanguageThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in OpenEdge Advanced Business Language.JavaScriptJavaScriptThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in JavaScript.PerlPerlThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Perl.Smalltalk (computer programming)Smalltalk (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Smalltalk.PHPPHPThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in PHP.Assembly (computer programming)Assembly (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Assembly.C#C#The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in C#.RRThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in R.GroovyGroovyThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Groovy.ASP.NETASP.NETThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in ASP.NET.APLAPLThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in APL.CiscoCiscoThe products available from the network equipment provider Cisco and methods for selecting and procuring the equipment.ICT security legislationICT security legislationThe set of legislative rules that safeguards information technology, ICT networks and computer systems and legal consequences which result from their misuse. Regulated measures include firewalls, intr...organisational resilienceorganisational resilienceThe strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by ...Microsoft Visual C++Microsoft Visual C++The computer program Visual C++ is a suite of software development tools for writing programs, such as compiler, debugger, code editor, code highlights, packaged in a unified user interface. It is dev...TypeScriptTypeScriptThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in TypeScript.cloud monitoring and reportingcloud monitoring and reportingThe metrics and alarms utilizing cloud monitoring services, in particular performance and availability metrics.CoffeeScriptCoffeeScriptThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in CoffeeScript.Objective-CObjective-CThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Objective-C.ML (computer programming)ML (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in ML.AJAXAJAXThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in AJAX.C++C++The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in C++.SAP R3SAP R3The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in SAP R3.Swift (computer programming)Swift (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Swift.MATLABMATLABThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in MATLAB.Python (computer programming)Python (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Python.ICT encryptionICT encryptionThe conversion of electronic data into a format which is readable only by authorized parties which use key encryption techniques, such as Public Key Infrastructure (PKI) and Secure Socket Layer (SSL).Scratch (computer programming)Scratch (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Scratch.VBScriptVBScriptThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in VBScript.COBOLCOBOLThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in COBOL.Pascal (computer programming)Pascal (computer programming)The techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Pascal.ABAPABAPThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in ABAP.Internet of ThingsInternet of ThingsThe general principles, categories, requirements, limitations and vulnerabilities of smart connected devices (most of them with intended internet connectivity).ScalaScalaThe techniques and principles of software development, such as analysis, algorithms, coding, testing and compiling of programming paradigms in Scala.manage IT security compliancesmanage IT security compliancesGuide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.cooperate with colleaguescooperate with colleaguesCooperate with colleagues in order to ensure that operations run effectively.implement ICT security policiesimplement ICT security policiesImplement statements, assertions or rules that specify the appropriate use and protection of the ICT assets and systems from an organisation. These ICT security policies cover topics such as data clas...comply with legal regulationscomply with legal regulationsEnsure you are properly informed of the legal regulations that govern a specific activity and adhere to its rules, policies and laws.execute ICT auditsexecute ICT auditsOrganise and execute audits in order to evaluate ICT systems, compliance of components of systems, information processing systems and information security. Identify and collect potential critical issu...use back-up and recovery toolsuse back-up and recovery toolsUse tools which allow users to copy and archive computer software, configurations and data and recover them in case of loss.remove computer virus or malware from a computerremove computer virus or malware from a computerCarry out actions to remove computer viruses or other types of malware from a computer.implement a virtual private networkimplement a virtual private networkCreate an encrypted connection between private networks, such as different local networks of a company, over the internet to ensure that only authorized users can access it and that the data cannot be...implement anti-virus softwareimplement anti-virus softwareDownload, install and update software to prevent, detect and remove malicious software, such as computer viruses.implement cloud security and complianceimplement cloud security and complianceImplement and manage security policies and access controls on cloud. Differentiate between the roles and responsibilities within the shared responsibility model.manage cloud data and storagemanage cloud data and storageCreate and manage cloud data retention. Identify and implement data protection, encryption, and capacity planning needs.implement a firewallimplement a firewallDownload, install and update a network security system designed to prevent unauthorized access to a private network.manage keys for data protectionmanage keys for data protectionSelect appropriate authentication and authorization mechanisms. Design, implement and troubleshoot key management and use. Design and implement a data encryption solution for data at rest and data in ...install low voltage wiringinstall low voltage wiringPlan, deploy, troubleshoot and test low voltage wiring.
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
52/ 100
Moderate Risk
Low riskHigh risk