cyber incident responder
ISCO: 2529. Skills: 76. Essential: 24.
Essential skills
- attack vectors
- building systems monitoring technology
- collect cyber defence data
- communicate with stakeholders
- cope with stress
- create incident reports
- cyber attack counter-measures
- cyber security
- engage with stakeholders
- ethical hacking principles
- GDPR
- handle cybersecurity incidents
- ICT network security risks
- ICT safety
- ICT security legislation
- ICT security standards
- incidents and accidents recording
- operating systems
- operational tactics for emergency responses
- protect ICT devices
- provide ICT consulting advice
- risk management
- security engineering
- security threats
Supporting skills
- business intelligence
- C++
- cloud monitoring and reporting
- cloud security and compliance
- cloud technologies
- consult with business clients
- copyright legislation
- create project specifications
- defence standard procedures
- define quality standards
- develop information security strategy
- embedded systems
- ensure information security
- ensure proper document management
- give live presentation
- ICT encryption
- ICT process quality models
- ICT project management methodologies
- implement a firewall
- implement a virtual private network
- implement anti-virus software
- implement ICT risk management
- implement ICT security policies
- implement spam protection
- information security strategy
- internet governance
- Internet of Things
- lead disaster recovery exercises
- leadership principles
- lean project management
- manage a team
- manage changes in ICT system
- manage digital identity
- manage ICT change request process
- manage IT security compliances
- manage keys for data protection
- monitor system performance
- optimise choice of ICT solution
- perform project management
- perform risk analysis
- perform scientific research
- Process-based management
- project management
- protect personal data and privacy
- provide information
- provide user documentation
- Python (computer programming)
- remove computer virus or malware from a computer
- safety engineering
- track key performance indicators
- troubleshoot
- web application security threats