252909 - Information and communication technology security administrator
Plans and implements security measures to protect information and data from unauthorized access, intentional attack, theft and corruption.
Main activities
• analyzes system and network structure, hardware and software components and data, identifies weaknesses and vulnerabilities related to hacks or attacks. Performs cyber infrastructure diagnostic procedures, including research, identification, interpretation and categorization of vulnerabilities, related attacks and malicious code;
• creates a system for identification, approval and authorization of persons and controls their access to resources, associates user rights and restrictions with the established identity;
• knows various information security control measures, ensures maximum protection of databases;
• applies the guidelines of relevant industry standards, adheres to best practices and legal requirements to ensure information security;
• Identifies problems related to servers, desktops, printers, networks, remote access and takes actions to resolve the problems.
Characteristic competences
• identify the weak points of information and communication technology systems;
• oversee the management of the identity of users of information and communication technologies;
• ensure database security;
• manage compliance with information technology security requirements;
• troubleshoot information and communication technologies.