Typical Tasks
Assess the quality of security controls, using performance indicators.
Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
Coordinate monitoring of networks or systems for security breaches or intrusions.
Coordinate vulnerability assessments or analysis of information security systems.
A day in the life
What kind of work is this?
Conventional
Organized, Procedural Work
Investigative
Studying, Research based work
Realistic
Practical, Physical Work
Only a subset of this occupation's profile is available. Data collection is currently underway to populate other parts of the profile.
What personality traits do you need to succeed?
There is no data available.
What key skills are needed for this job?
There is no data available.
Expected Knowledge
There is no data available.
Common Activities
There is no data available.