ICT Security Specialist ANZSCO 262112
DescriptionICT Security Specialist ANZSCO 262112 establishes, manages and administers an organization’s ICT security policy and procedures to ensure preventive and recovery strategies are in place, and minimize the risk of internal and external security threats. Security specialist’s co-ordinate and implement security measures to protect computer systems from unauthorized access. This is a critical role, which is responsible for protecting an organization’s information.
Skill level: 1
- Security Administrator
- Information Technology Security Manager
Skills Assessment Authority
Occupation ListsICT Security Specialist is on the following skill lists:
- Combined Skilled Occupations List (STSOL MLTSSL)
- Medium Long Term Strategic Skills List (MLTSSL)
- RSMS Occupations List (RSMSL)
- Labor Market Testing Required for 457 List (LMTL)
- Short-Term Skilled Occupation List (STSOL)
As the occupation features on the Short-term Skilled Occupation List (STSOL), it is possible to apply for a Skilled Nominated 190 visa or a Skilled Regional Nominated 489 visa. If you are employed in this occupation and you wish to pursue a GSM visa, you will be required to apply for state nomination in order to move to Australia.
Note: *While the occupation is on the STSOL it remains a possibility that no states currently have a demand for people in that profession. The online assessment only lists occupations which are currently in demand by a state or territory in Australia, so if the occupation does not appear on the online assessment you should consider seeking an employer sponsor in Australia.
Unit Group: 2621 Database and Systems Administrators, and ICT Security Specialist
The job of an ICT security specialist in Australia is to plan, develop, maintain, manage and administer an organizations database management systems, operating systems and security policies and procedures to ensure optimal database and system integrity, security, backup, reliability and performance.
- designing and maintaining database architecture, data structures, tables, dictionaries and naming conventions to ensure the accuracy and completeness of all data master files
- performing the operational establishment and preventive maintenance of backups, recovery procedures, and enforcing security and integrity controls
- implementing and administering database documentation, guidelines, policies and procedures
- testing database systems and upgrades, such as debugging, tracking, reproduction, logging and resolving all identified problems, according to approved quality testing scripts, procedures and processes
- accepting responsibility for the processes, procedures and operational management associated with system security and disaster recovery planning
- liaising with security vendors, suppliers, service providers and external resources; analyzing, recommending, installing and maintaining software security applications; and monitoring contractual obligations, performance delivery and service level agreements
- troubleshooting and providing service support in diagnosing, resolving and repairing server-related hardware and software malfunctions, encompassing workstations and communication infrastructure
- preparing and maintaining documentation, policies and instructions, and recording and detailing operational procedures and system logs
- ensuring that the design of computer sites allows all components to fit together and work properly, and monitoring and adjusting the performance of networks
- continually surveying the current computer site to determine future network needs and making recommendations for enhancements in the implementation of future servers and networks
Most occupations in this unit group have a level of skill commensurate with a bachelor degree or higher qualification. At least five years of relevant experience and/or relevant vendor certification may substitute for the formal qualification. In some instances relevant experience and/or on-the-job training may be required in addition to the formal qualification (ANZSCO Skill Level 1).
Occupations in this Group
- IELTS result with a minimum score of 6 (L, R, W), 7 in speaking and 7 overall;
- OET result with a minimum grade B in all sections;
- TOEFL iBT with a minimum score (L:12 R:13 W:21 S:23 overall L93);
- PTE Academic with a minimum score of 50 (L, R, W), 65 in speaking and 65 overall
- Australian Graduate exceptions apply in some states/territories
- Priority Skilled Lists may apply a specific requirement in some states/territories
- Countries exempt from submitting IELTS or OET include the UK; Canada; New Zealand; US; and Ireland
- Where mandatory licensing or registration is required you must demonstrate a level of English either sufficient to meet licensing / registration or a minimum IELTS, or equivalent, whichever is higher.
Closely Related Core ICT Units
- Computer forensics
- Data Encryption
- Database design
- Database implementation
- Database Management Systems – (Relational Database, Object Oriented Database, RDBMS)
- Information security
- Information Systems security
- Internet and the Web
- Internet forensics
- Network security
- Operating systems – (Unix, Linux, Xenix, Network OS)
- Web security
ICT security specialists focus on protecting an organisation’s data. They develop safe electronic storage for data, ensure that data transactions are monitored, and monitor networks for security breaches. They also assist in developing secure mobile access so that information can be safely accessed remotely via mobile devices. They create policies about how staff may transmit company information using devices such as USB drives or external online data services. They are responsible for designing, testing, implementing and monitoring security measures for company’s systems. They provide training to related employees in security awareness, protocols and procedures. They design and conduct security audits to ensure operational security.
Additional Closely Related ICT Units
- Client Server Technology
- Computer networks
- Critical Path Method
- Data Communications
- Data policy
- Data structures
- Distributed Systems
- File Processing
- Introduction to ICT – (Introduction to Computer Science, Computer Theory, Introduction to Business Computing, Computer Science I)
- Project Management
- Quality management – (Quality Assurance, Software Quality)
- Testing strategies and methods
ICT Security Specialist establishes, manages and administers an organisation’s ICT security policy and procedures to ensure preventive and recovery strategies are in place, and minimise the risk of internal and external security threats. Security Specialists tend to be all-rounders. They configure firewalls and implement compliance measures and also be adept in pen testing, auditing, and post-incident analysis. In some cases, Security Specialists may be the one responsible for developing an infosec strategy, recommending security products, and even training other employees.