Recent Searches
MASCO Code
1511-21
Compare
Computer Security Manager
STEM
Computer Security Manager planning and carrying out security measures that will protect a business’s data and information from deliberate attack, unauthorised access, corruption and theft.
Alternative Names
Tasks
Preparing technical documentation and reports for users and managers
managing, planning, scheduling and monitoring the tasks of other workers
Carrying out corrective actions in the event of a breach
Ensuring that international and national network security standards are met
Looking for weak points in the system and securing them
Testing security products and evaluating them
Making plans for disaster recovery in case security is breached
Simulating security breaches to test procedures
overseeing and controlling all aspects of computer security
Upgrading existing security systems or designing new ones
  • M
    Professional, Scientific And Technical Activities
  • J
    Information And Communication
  • N
    Administrative And Support Service Activities
  • J620-001-5:2019
    Cyber Security Penetration Testing & Assessment
  • IT-090-5
    ICT System Security Technologist
  • 0611
    Information Technology and Information System
  • 0612
    Software Engineering
  • 0613
    Computer Science
  • 0614
    Computer Use
Skills
Asas
Basic ICT
proficiency in using computers to retrieve, access, store, produce, present and exchange information.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. 
Monitoring
Proficiency in monitoring/assessing performance of yourself, other individuals, or organisations to make improvements or take corrective action.
Decision Making
proficiency in choosing between two or more alternatives.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Khusus
ICT Literacy
ability to search, analyze, evaluate, organize, create, use, manage and communicate information to solve ICT problems.
Network Security
proficiency in protecting of the underlying networking infrastructure from unauthorized access, misuse, or theft.
Machine Learning
proficiency in application of artificial intelligence (AI) that provides systems the ability to automatically learn.
Coding
proficiency in computer language used to develop apps, websites, and software.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Database Administration
proficiency in managing and maintaining database management systems (DBMS) software.
Data Management Protection
proficiency in management and monitoring of data backup and protection services of a computer network or IT environment.
Data Design and Migration
proficiency in designing database model and migrating the data from source databases to target databases
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
Center Image