Loading...
Major Group
2
Professionals
Sub-Major Group
25
Information and Communications Technology Professionals
Unit Group
2531
Cyber Security Professionals
Small Unit Group
2531-01
Information and Communication Technology Security Executive
2531-02
Cybersecurity Executive
2531-03
Digital Forensic Specialist
2531-04
Security Specialist (Information Technology)
2531-05
Security Technologist Specialist
2531-06
Security Architect (Information Technology)
2531-07
Application Security Specialist
2531-08
Security Strategist
2531-09
Network Penetration Tester
2531-10
Network Strategist
2531-11
Technology Strategist
2531-12
Enterprise Convergence Strategist
2531-13
Access Control Specialist
2531-14
Data Security Specialist
2531-15
Security Engineer (Information Technology)
2531-16
Cybersecurity Architect
2531-17
Cybersecurity Specialist
2531-18
Information Security Analyst
2531-19
Security Administrator (Information Technology)
2531-20
Information Security Officer
2531-21
Incident Responder (Information Technology)
2531-22
Penetration Tester (Information Technology)
2531-23
Malware Analyst
2531-24
Cyber Threat Investigator
2531-25
Forensic Analyst (Information Technology)
2531-26
Cybersecurity Consultant
2531-27
Cybersecurity Engineer
2531-28
Systems Security Engineer
2531-29
DevOps Engineer
2531-30
Cybersecurity Analyst
2531-31
Test Analyst (Information Technology)
2531-32
Security Officer (Information Technology)
2531-33
Security Executive (Information Technology)
2531-34
Cyber Risk Analyst
2531-35
Security Penetration Tester (Information Technology)
2531-36
Security Infrastructure Engineer
2531-37
Forensic Investigator
2531-38
Principal Security Engineer
2531-39
Internet Safety Evaluater
2531-40
Information Technology Security Analyst
2531-41
Information Security Consultant
2531-42
Security Consultant
Kod MASCO
2531-14
Compare
Data Security Specialist
STEM
Data Security Specialist ensure that the processing of personal data in an organisation is compliant with data protection standards and with the obligations set out in the applicable legislation.

Alternative Names
Tasks
Providing specific denial and fraud operations and the collection of cyber security information that may be used to develop intelligence
investigating cybersecurity events or crimes related to information technology systems, networks, and digital evidence
providing specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence
Investigating cyber security incidents or crimes related to information technology systems, networks, and digital evidence
providing leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work
providing the support, administration, and maintenance necessary to ensure effective and efficient information technology system performance and security
performing highly-specialized review and evaluation of incoming cybersecurity information to
determine its usefulness for intelligence
identifying, analyzing, and mitigates threats to internal information technology systems and/or networks
-
MProfessional, Scientific And Technical Activities
-
JInformation And Communication
-
IT-090-5ICT System Security Technologist
-
0611Information Technology and Information System
-
0612Software Engineering
-
0613Computer Science
Skills
Complex Problem Solving
Critical Thinking
Speaking
Cybersecurity Assessment
JavaScript
Malware analysis
Penetration Testing
Security Assessment
Vulnerability Assessment
Analysis
Intrusion Detection
Reading Comprehension
Active Listening

Laporan Kewangan
Analisis Faktor
