ICT Security Specialist develops, manages, and administers an organization’s ICT security policies and processes to guarantee preventative and recovery plans are in place and to reduce the risk of internal and external security threats.
ICT Security Specialist ANZSCO 262112
Level 1 or Equivalent
Information Technology Security Manager
Skills Assessment Authority
ACS (Australian Computer Society)
Give us a call at +61 483 901 154
directly for immediate query and fast assessment!
Feel free to contact our friendly team of writers with any questions you have.
Unit Group: 2621
Database and Systems Administrators, and ICT Security Specialist
An ICT security specialist is responsible for planning, developing, maintaining, managing, and administering an organization’s database management systems, operating systems, and security policies and procedures to ensure optimal database and system integrity, security, backup, reliability, and performance.
The majority of professions in this unit category need a level of expertise equivalent to a bachelor’s degree or more. For the formal qualification, at least five years of relevant experience and/or equivalent vendor certification may be substituted. In some cases, in addition to the official qualification (ANZSCO Skill Level 1), appropriate experience and/or on-the-job training may be necessary.
- IELTS result with a minimum score of 6 in writing, listening, reading), 7 in speaking, and 7 overall.
- OET result with a minimum grade B in all sections.
- TOEFL iBT with a minimum score of 12 in listening, 13 in reading, 21 in writing, 23 in speaking, and overall 93.
- PTE Academic with a min score of 50 in (writing, reading, listening), 65 in speaking, and 65 overall.
Tasks to Perform
- Creating and maintaining database architecture, data structures, tables, dictionaries, and naming standards to assure the correctness and completeness of all data master files.
- Accepting accountability for the processes, procedures, and operational management related to system security and disaster recovery planning.
- Troubleshooting and service support in diagnosing, resolving, and repairing server-related hardware and software failures, including workstations and communication infrastructure.
- Creating, implementing, and managing database documentation, guidelines, rules, and procedures.
- Debugging, tracking, reproducing, logging, and resolving all detected problems when testing database systems and updates following authorized quality testing scripts, procedures, and methods.
- Liaison with security vendors, suppliers, service providers, and external resources; analysis, recommendation, installation, and maintenance of software security applications; and monitoring contractual commitments, performance delivery, and service level agreements.
- Surveying the existing computer site regularly to estimate future network requirements and offering recommendations for improvements in the deployment of future servers and networks.
- Performing the operational setup and preventative maintenance of backups and recovery operations, as well as imposing security and integrity controls.
- Creating and updating documentation, policies, and procedures, as well as capturing and describing operating processes and system logs.
- Assuring that the architecture of computer sites permits all components to fit together and function effectively, as well as monitoring and changing network performance.
ICT Security Specialist
Occupation Lists and Related Core ICT Units
An ICT Security Specialists is responsible for the plan and carrying out security procedures to keep computer systems safe from unwanted access. This is a key function that is in charge of safeguarding an organization’s information. Following are the occupation lists and related core ICT units:
On the Occupation Lists
- Combined Skilled Occupations List (STSOL MLTSSL)
- Medium Long Term Strategic Skills List (MLTSSL)
- RSMS Occupations List (RSMSL)
Not on the Occupation Lists
- Labour Market Testing Required for 457 List (LMTL)
- Short-Term Skilled Occupation List (STSOL)
Related Core ICT Units
Closely Related Core ICT Units
- Network security
- Database implementation
- Web security
- Database design
- Database Management Systems – (Relational Database, Object Oriented Database, RDBMS)
- Computer forensics
- Internet and the Web
- Data Encryption
- Internet Forensics
- Information Systems Security
- Information Security
- Operating systems – (Unix, Linux, Xenix, Network OS)
Additional Closely Related Core ICT Units
- Distributed Systems
- Data structures
- Data policy
- Critical Path Method
- Data Communications
- Quality management – (Quality Assurance, Software Quality)
- Computer networks
- File Processing
- Client-Server Technology
- Testing strategies and Methods
- Project Management
- Introduction to ICT – (Introduction to Computer Science, Computer Theory, Introduction to Business Computing, Computer Science I)
Frequently Asked Question
How much time does it take for a CDR to be delivered?
What are the requirements for CDR report writing service? Do I need to submit any document?
– One Passport Size Photograph
– Bio Page of Identity Proof
– CV / Resume
– English Test Result Card
– Three Career Episodes
– Certificate of Degree
– Certified Academic Transcripts
– 3 Career Episodes
– Continual Professional Development (CPD) Report
– Summary Statement