Infocomm TechnologyInformation and communications technology professionalsISCO 2529
cybersecurity risk manager
Cybersecurity risk managers identify, analyse, assess, estimate and mitigate cybersecurity-related risks of ICT infrastructures such as systems or services. They manage these aspects by planning risk analysis, applying, reporting, assessing, communicating, and treating them. They establish a risk management strategy for the organisation and ensure that risks remain at an acceptable level for the organisation by selecting mitigation actions and controls.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (19)
ICT safetyICT safetyPersonal protection, data protection, digital identity protection, security measures, safe and sustainable use.internal risk management policyinternal risk management policyThe internal risk management policies that identify, assess and prioritise risks in an IT environment. The methods used to minimise, monitor and control the possibility and the impact of disastrous ev...ethical hacking principlesethical hacking principlesThe set of actions that are carried out to detect vulnerabilities within a computerised system in order to improve security within an organisation. They aim to identify and address data breaches and t...ICT network security risksICT network security risksThe security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the con...ICT security standardsICT security standardsBest practices and guidelines established for securing information and communication technology (ICT) systems and data. Standards as is the case of ISO 27000 series, provide a framework for implementi...attack vectorsattack vectorsPaths or methods that threat actors use to exploit vulnerabilities in information networks or systems from a concrete organisation and impact its availability, integrity and confidentiality. Attack ve...cyber attack counter-measurescyber attack counter-measuresMethods, technologies and techniques used to defend (detect, monitor and recover) against cyber attacks. These cyber attacks include several attack vectors such as malware, denial of service (DoS) att...risk managementrisk managementThe process of identifying, assessing, and prioritising of all types of risks and where they could come from, such as natural causes, legal changes, or uncertainty in any given context, and the method...security engineeringsecurity engineeringInterdisciplinary field of study that focuses on the realisation of secure systems and the technology to protect individuals or information from malice, errors, or unauthorized access. It involves def...assessment of risks and threatsassessment of risks and threatsThe security documentation and any security-related communications and information.cyber securitycyber securityThe methods and best practices that protect ICT systems, networks, computers, devices, services, processes and people against unauthorised access, modification and/or denial of service of assets.ICT performance analysis methodsICT performance analysis methodsThe methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, appli...establish an ICT security prevention planestablish an ICT security prevention planDefine a comprehensive and proactive strategy for managing information and communication technology (ICT) security risks by establishing a set of measures and responsibilities to ensure the confidenti...manage system securitymanage system securityAnalyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and imple...communicate with stakeholderscommunicate with stakeholdersFacilitate communication between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the organisation and its obj...establish an Information Security Management Systemestablish an Information Security Management SystemDesign, apply, monitor and review an Information Security Management System (ISMS) that preserves the confidentiality, integrity and availability of information by applying a risk management process, ...implement ICT risk managementimplement ICT risk managementDevelop and implement procedures for identifying, assessing, treating and mitigating ICT risks, such as hacks or data leaks, according to the company's risk strategy, procedures and policies. Analyse ...engage with stakeholdersengage with stakeholdersUse a variety of processes that result in mutually negotiated agreements, shared understandings and consensus building. Build partnerships within the work context.advice on security risk managementadvice on security risk managementProvide advice on security risk management policies and prevention strategies and their implementation, being aware of the different kinds of security risks a specific organisation faces.
Optional (50)
domain name servicedomain name serviceNaming database which maps internet domain names to Internet Protocol (IP) addresses. The Domain Name System allows internet users to utilise names such as website titles instead of remembering numeri...systems development life-cyclesystems development life-cycleThe sequence of steps, such as planning, creating, testing and deploying and the models for the development and life-cycle management of a system.computer forensicscomputer forensicsThe process of examining and recovering digital data from sources for legal evidence and crime investigation.cloud security and compliancecloud security and complianceCloud security and compliance concepts, including shared responsibility model, cloud access management capabilities, and resources for security support.ICT quality policyICT quality policyThe quality policy of the organisation and its objectives, the acceptable level of quality and the techniques to measure it, its legal aspects and the duties of specific departments to ensure quality.decision support systemsdecision support systemsThe ICT systems that can be used to support business or organisational decision making.internet governanceinternet governanceThe principles, regulations, norms and programs that shape the evolution and use of internet, such as internet domain names management, registries and registrars, according to ICANN/IANA regulations a...Outsourcing modelOutsourcing modelThe outsourcing model consists of principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business syste...hybrid modelhybrid modelThe hybrid model consists of principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems wi...audit techniquesaudit techniquesThe techniques and methods that support a systematic and independent examination of data, policies, operations and performances using computer-assisted audit tools and techniques (CAATs) such as sprea...tools for ICT test automationtools for ICT test automationThe specialised software to execute or control tests and compare predicted testing outputs with actual testing results such as Selenium, QTP and LoadRunner.ICT security legislationICT security legislationThe set of legislative rules that safeguards information technology, ICT networks and computer systems and legal consequences which result from their misuse. Regulated measures include firewalls, intr...organisational resilienceorganisational resilienceThe strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by ...service-oriented modellingservice-oriented modellingThe principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems within a variety of archite...levels of software testinglevels of software testingThe levels of testing in the software development process, such as unit testing, integration testing, system testing and acceptance testing.cloud monitoring and reportingcloud monitoring and reportingThe metrics and alarms utilizing cloud monitoring services, in particular performance and availability metrics.web application security threatsweb application security threatsThe attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP.ICT project managementICT project managementThe methodologies for the planning, implementation, review and follow-up of ICT projects, such as the development, integration, modification and sales of ICT products and services, as well as projects...ICT problem management techniquesICT problem management techniquesThe techniques related to identifying the solutions of the root cause of ICT incidents.information confidentialityinformation confidentialityThe mechanisms and regulations which allow for selective access control and guarantee that only authorised parties (people, processes, systems and devices) have access to data, the way to comply with ...legal requirements of ICT productslegal requirements of ICT productsThe international regulations related to the development and use of ICT products.Open source modelOpen source modelThe open source model consists of principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business syste...investment analysisinvestment analysisThe methods and tools for analysis of an investment compared to its potential return. Identification and calculation of profitability ratio and financial indicators in relation to associated risks to ...ICT recovery techniquesICT recovery techniquesThe techniques for recovering hardware or software components and data, after failure, corruption or damage.ICT system user requirementsICT system user requirementsThe process intended to match user and organisation's needs with system components and services, by taking into consideration the available technologies and the techniques required to elicit and speci...mobile device managementmobile device managementThe methods for managing the use of mobile devices within an organisation, while ensuring security.ICT encryptionICT encryptionThe conversion of electronic data into a format which is readable only by authorized parties which use key encryption techniques, such as Public Key Infrastructure (PKI) and Secure Socket Layer (SSL).Internet of ThingsInternet of ThingsThe general principles, categories, requirements, limitations and vulnerabilities of smart connected devices (most of them with intended internet connectivity).ICT process quality modelsICT process quality modelsThe quality models for ICT services which address the maturity of the processes, the adoption of recommended practices and their definition and institutionalisation that allow the organisation to reli...use an application-specific interfaceuse an application-specific interfaceUnderstand and use interfaces particular to an application or use case.implement ICT security policiesimplement ICT security policiesImplement statements, assertions or rules that specify the appropriate use and protection of the ICT assets and systems from an organisation. These ICT security policies cover topics such as data clas...define technology strategydefine technology strategyCreate an overall plan of objectives, practices, principles and tactics related to the use of technologies within an organisation and describe the means to reach the objectives, taking into account an...develop information security strategydevelop information security strategyCreate company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.define security policiesdefine security policiesDesign and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and dat...use ICT ticketing systemuse ICT ticketing systemUtilise a specialised system to track registration, processing and resolution of issues in an organisation by assigning each of these issues a ticket, registering inputs from involved persons, trackin...manage disaster recovery plansmanage disaster recovery plansPrepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.develop with cloud servicesdevelop with cloud servicesWrite code that interacts with cloud services by using APIs, SDKs, and cloud CLI. Write code for serverless applications, translate functional requirements into application design, implement applicati...execute ICT auditsexecute ICT auditsOrganise and execute audits in order to evaluate ICT systems, compliance of components of systems, information processing systems and information security. Identify and collect potential critical issu...use back-up and recovery toolsuse back-up and recovery toolsUse tools which allow users to copy and archive computer software, configurations and data and recover them in case of loss.remove computer virus or malware from a computerremove computer virus or malware from a computerCarry out actions to remove computer viruses or other types of malware from a computer.solve ICT system problemssolve ICT system problemsIdentify potential component malfunctions. Monitor, document and communicate about incidents. Deploy appropriate resources with minimal outage and deploy appropriate diagnostic tools.implement a virtual private networkimplement a virtual private networkCreate an encrypted connection between private networks, such as different local networks of a company, over the internet to ensure that only authorized users can access it and that the data cannot be...implement anti-virus softwareimplement anti-virus softwareDownload, install and update software to prevent, detect and remove malicious software, such as computer viruses.implement cloud security and complianceimplement cloud security and complianceImplement and manage security policies and access controls on cloud. Differentiate between the roles and responsibilities within the shared responsibility model.implement spam protectionimplement spam protectionInstall and configure software that supports email-users to filter messages that contain malware or that are unsolicited.lead disaster recovery exerciseslead disaster recovery exercisesHead exercises which educate people on what to do in case of an unforeseen disastrous event in the functioning or security of ICT systems, such as on recovery of data, protection of identity and infor...design for organisational complexitydesign for organisational complexityDetermine cross-account authentication and access strategy for complex organizations (for example, an organization with varying compliance requirements, multiple business units, and varying scalabilit...implement a firewallimplement a firewallDownload, install and update a network security system designed to prevent unauthorized access to a private network.manage keys for data protectionmanage keys for data protectionSelect appropriate authentication and authorization mechanisms. Design, implement and troubleshoot key management and use. Design and implement a data encryption solution for data at rest and data in ...identify ICT security risksidentify ICT security risksApply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and eval...
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
60/ 100
High Risk
Low riskHigh risk