Recent Searches
MASCO Code
2531-39
Compare
Internet Safety Evaluater
STEM
Internet Safety Evaluater will involve reviewing and evaluating the video content of potentially upsetting or offensive material to make internet browsing safer and more secure for all users.
Alternative Names
Tasks
investigating cybersecurity events or crimes related to information technology systems, networks, and digital evidence
Investigating cyber security incidents or crimes related to information technology systems, networks, and digital evidence
providing specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence
Providing specific denial and fraud operations and the collection of cyber security information that may be used to develop intelligence
providing leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work
providing the support, administration, and maintenance necessary to ensure effective and efficient information technology system performance and security
performing highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence
identifying, analyzing, and mitigates threats to internal information technology systems and/or networks
  • M
    Professional, Scientific And Technical Activities
  • J
    Information And Communication
  • IT-090-5
    ICT System Security Technologist
  • 0611
    Information Technology and Information System
  • 0612
    Software Engineering
  • 0613
    Computer Science
Skills
Asas
Active Listening
Proficiency in giving full attention to what other people are saying, taking time to understand the points being made and asking questions as appropriate.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. 
Speaking
Proficiency in communicating effectively as well as convey information verbally and in a way that can understand.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Complex Problem Solving
proficiency in identifying complex problems and reviewing related information to make assessments and implement solutions.
Khusus
Analysis
ability to collect and analyze information, problem-solve, and make decisions.
Malware analysis
proficiency in determining the functionality, origin and potential impact of a given malware sample.
JavaScript
proficiency in using scripting or programming language that allows it to implement complex features on web pages.
Intrusion Detection
proficiency in using a device or software application to monitor a network or system for malicious activity or policy violations.
Vulnerability Assessment
ability to identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.
Security Assessment
proficiency to identify the current security posture of an information system or organization.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
Center Image