Protect an organization's critical information and assets by applying latest information security practices, processes, frameworks, and techniques.
|
|
|
|
|
|
Formulate, update, and communicate relevant short- and long-term organizational cyber security strategies and policies to effectively secure and monitor information systems.
|
|
|
|
|
|
Design and implement secure information systems, components, and processes in a timely manner as well as identify, analyze, and solve problems associated with these systems.
|
|
|
|
|
|
Understand the human, administrative, ethical aspects of information security profession and abide by all legal aspects associated with it.
|
|
|
|
|
|
Demonstrate a broad knowledge of core concepts, theories, and practical skills within the field of information security technologies.
|
|
|
|
|
|
Occupy roles in secure systems development, networking, administration, operations and forensic analysis.
|
|
|
|
|
|
Plan and perform various tasks and projects that comprise long time spans, alone and as participant in a team in compliance with applicable legal and ethical requirements and regulations.
|
|
|
|
|
|
Present relevant topics like theories, problems and solutions in written, oral and other applicable forms of expression.
|
|
|
|
|
|
Design, implement, and administer solutions for networking and security problems to satisfy organizational goals.
|
|
|
|
|
|
Recognize the need for, and be able to engage in, all aspects of lifelong learning.
|
|
|
|
|
|