Recent Searches
MASCO Code
2531-15
Compare
Security Engineer (Information Technology)
STEM
Security Engineer (Information Technology) advise and implement solutions to control access to data and programs and ensure the protection of the organization's mission and business processes.
Alternative Names
Application Security Specialist
Technology Strategist
Information and Communication Technology Security Executive
Network Strategist
Tasks
identifying, analyzing, and mitigates threats to internal information technology systems and/or networks
providing leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work
providing the support, administration, and maintenance necessary to ensure effective and efficient information technology system performance and security
Providing specific denial and fraud operations and the collection of cyber security information that may be used to develop intelligence
investigating cybersecurity events or crimes related to information technology systems, networks, and digital evidence
providing specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence
Investigating cyber security incidents or crimes related to information technology systems, networks, and digital evidence
performing highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence
  • M
    Professional, Scientific And Technical Activities
  • J
    Information And Communication
  • IT-090-5
    ICT System Security Technologist
  • 0611
    Information Technology and Information System
  • 0612
    Software Engineering
  • 0613
    Computer Science
Skills
Asas
Active Listening
Proficiency in giving full attention to what other people are saying, taking time to understand the points being made and asking questions as appropriate.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. 
Speaking
Proficiency in communicating effectively as well as convey information verbally and in a way that can understand.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Complex Problem Solving
proficiency in identifying complex problems and reviewing related information to make assessments and implement solutions.
Khusus
Analysis
ability to collect and analyze information, problem-solve, and make decisions.
Malware analysis
proficiency in determining the functionality, origin and potential impact of a given malware sample.
JavaScript
proficiency in using scripting or programming language that allows it to implement complex features on web pages.
Intrusion Detection
proficiency in using a device or software application to monitor a network or system for malicious activity or policy violations.
Vulnerability Assessment
ability to identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.
Security Assessment
proficiency to identify the current security posture of an information system or organization.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
Center Image