chief ICT security officer
ISCO: 2529. Skills: 81. Essential: 47.
Essential skills
- advice on security risk management
- assessment of risks and threats
- attack vectors
- audit techniques
- communicate with stakeholders
- comply with legal regulations
- cyber attack counter-measures
- cyber security
- data protection
- decision support systems
- develop information security strategy
- educate on data confidentiality
- engage with stakeholders
- ensure adherence to organisational ICT standards
- ensure compliance with legal requirements
- ensure cross-department cooperation
- ensure information privacy
- establish an ICT security prevention plan
- establish an Information Security Management System
- ethical hacking principles
- ethics
- forecast organisational risks
- ICT network security risks
- ICT process quality models
- ICT project management
- ICT project management methodologies
- ICT safety
- ICT security legislation
- ICT security standards
- identify ICT security risks
- implement corporate governance
- implement ICT risk management
- implement ICT security policies
- information confidentiality
- information security strategy
- internal risk management policy
- lead disaster recovery exercises
- maintain plan for continuity of operations
- manage disaster recovery plans
- manage IT security compliances
- manage system security
- monitor developments in field of expertise
- monitor technology trends
- organisational resilience
- risk management
- security engineering
- utilise decision support system
Supporting skills
- apply operations for an ITIL-based environment
- assess ICT knowledge
- cloud monitoring and reporting
- cloud security and compliance
- cloud technologies
- computer forensics
- computer programming
- conduct impact evaluation of ICT processes on business
- control objectives for information and related technology
- coordinate technological activities
- create solutions to problems
- execute ICT audits
- ICT communications protocols
- ICT encryption
- ICT infrastructure
- ICT recovery techniques
- ICT system user requirements
- identify legal requirements
- implement a firewall
- implement a virtual private network
- implement anti-virus software
- implement cloud security and compliance
- internet governance
- Internet of Things
- manage digital identity
- manage keys for data protection
- manage staff
- optimise choice of ICT solution
- protect personal data and privacy
- software anomalies
- train employees
- use different communication channels
- web application security threats
- World Wide Web Consortium standards