SOL | State SOL | Employer SOL| Regional
Description
Analyses and assesses vulnerability in infrastructure (software, hardware and networks), investigates available tools and countermeasures to remedy detected vulnerabilities, and recommends solutions and best practices. Analyses and assesses damage to data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions.
Skill Level 1
Skills Assessment Authority ACS | ACS-FAQ | Your Career | My Future
Caveats No caveats apply to this occupation.
Group: 2241 Mathematical Science Professionals
Description
Gathers, cleans and interprets data by processing and applying information technology tools to transform, prepare and communicate results using interactive visualisations such as graphs and charts.
Tasks
- Performs assessments on systems, networks and applications to identify and prioritise potential security risks
- Coordinates, analyses and investigates security risk incidents and breaches to determine the root cause, and develops mitigation controls and strategies
- Conducts research on cyber threats and weaknesses to develop and maintain knowledge of the cyber threat landscape
- Develops and executes threat intelligence strategies for future threats and protects against potential attacks
- Conducts risk assessments to identify security loopholes and weaknesses in IT systems
- Conducts malware analysis to identify and mitigate potential threats to systems and networks
- Analyses alerts and data from security products, web proxies, network security devices, and vulnerable scan and management systems
Skill Level
Most occupations in this unit group have a level of skill commensurate with a bachelor degree or higher qualification. At least five years of relevant experience and/or relevant vendor certification may substitute for the formal qualification. In some instances relevant experience and/or on-the-job training may be required in addition to the formal qualification (ANZSCO Skill Level 1).
Alternative titles
ICT Security Analyst
Information Security Analyst
Specialisations
Cyber Security Researcher or Vulnerability Researcher
Cyber Security Vulnerability Assessor
Cyber Threat Analyst
Malware Analyst
Comments
0 comments
Please sign in to leave a comment.