Infocomm TechnologyInformation and communications technology professionalsISCO 2529
ICT resilience manager
ICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation's cyber security, resilience and disaster recovery.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (19)
internal risk management policyinternal risk management policyThe internal risk management policies that identify, assess and prioritise risks in an IT environment. The methods used to minimise, monitor and control the possibility and the impact of disastrous ev...system backup best practicesystem backup best practiceThe procedures related to preparing for recovery or continuation of technology infrastructure vital to an organisation.security engineeringsecurity engineeringInterdisciplinary field of study that focuses on the realisation of secure systems and the technology to protect individuals or information from malice, errors, or unauthorized access. It involves def...organisational resilienceorganisational resilienceThe strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by ...cyber securitycyber securityThe methods and best practices that protect ICT systems, networks, computers, devices, services, processes and people against unauthorised access, modification and/or denial of service of assets.ICT recovery techniquesICT recovery techniquesThe techniques for recovering hardware or software components and data, after failure, corruption or damage.manage IT security compliancesmanage IT security compliancesGuide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.manage system securitymanage system securityAnalyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and imple...develop information security strategydevelop information security strategyCreate company strategy related to the safety and security of information in order to maximise information integrity, availability and data privacy.comply with legal regulationscomply with legal regulationsEnsure you are properly informed of the legal regulations that govern a specific activity and adhere to its rules, policies and laws.analyse business processesanalyse business processesStudy the contribution of the work processes to the business goals and monitor their efficiency and productivity.manage disaster recovery plansmanage disaster recovery plansPrepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.implement ICT risk managementimplement ICT risk managementDevelop and implement procedures for identifying, assessing, treating and mitigating ICT risks, such as hacks or data leaks, according to the company's risk strategy, procedures and policies. Analyse ...execute ICT auditsexecute ICT auditsOrganise and execute audits in order to evaluate ICT systems, compliance of components of systems, information processing systems and information security. Identify and collect potential critical issu...analyse the context of an organisationanalyse the context of an organisationStudy the external and internal environment of an organisation by identifying its strengths and weaknesses in order to provide a base for company strategies and further planning.lead disaster recovery exerciseslead disaster recovery exercisesHead exercises which educate people on what to do in case of an unforeseen disastrous event in the functioning or security of ICT systems, such as on recovery of data, protection of identity and infor...perform ICT security testingperform ICT security testingExecute types of security testing, such as network penetration testing, wireless testing, code reviews, wireless and/or firewall assessments in accordance with industry-accepted methods and protocols ...implement ICT recovery systemimplement ICT recovery systemCreate, manage and implement ICT system recovery plan in case of crisis in order to retrieve information and reacquire use of the system.identify ICT security risksidentify ICT security risksApply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and eval...
Optional (22)
ICT safetyICT safetyPersonal protection, data protection, digital identity protection, security measures, safe and sustainable use.ethical hacking principlesethical hacking principlesThe set of actions that are carried out to detect vulnerabilities within a computerised system in order to improve security within an organisation. They aim to identify and address data breaches and t...cloud security and compliancecloud security and complianceCloud security and compliance concepts, including shared responsibility model, cloud access management capabilities, and resources for security support.ICT network security risksICT network security risksThe security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the con...core banking softwarecore banking softwareThe selection of software for core banking activities management (e.g. deposits, payments, loans, bank transactions, customer data) and other functions related to banking.human-computer interactionhuman-computer interactionThe study of the behaviour and interaction between digital devices and human beings.business process modellingbusiness process modellingThe tools, methods and notations such as Business Process Model and Notation (BPMN) and Business Process Execution Language (BPEL), used to describe and analyse the characteristics of a business proce...ICT system user requirementsICT system user requirementsThe process intended to match user and organisation's needs with system components and services, by taking into consideration the available technologies and the techniques required to elicit and speci...ICT process quality modelsICT process quality modelsThe quality models for ICT services which address the maturity of the processes, the adoption of recommended practices and their definition and institutionalisation that allow the organisation to reli...manage budgetsmanage budgetsPlan, monitor, report on the budget and prepare set production budgets.advise on strengthening securityadvise on strengthening securityProvide information and guidance to clients on how to prevent security threats and incidents.define security policiesdefine security policiesDesign and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and dat...respond to incidents in cloudrespond to incidents in cloudTroubleshoot issues with the cloud and determine how to restore operations. Design and automate disaster recovery strategies and evaluate a deployment for points of failure.provide cost benefit analysis reportsprovide cost benefit analysis reportsPrepare, compile and communicate reports with broken down cost analysis on the proposal and budget plans of the company. Analyse the financial or social costs and benefits of a project or investment i...perform procurement processesperform procurement processesUndertake ordering of services, equipment, goods or ingredients, compare costs and check the quality to ensure optimal payoff for the organisation.coordinate technological activitiescoordinate technological activitiesGive instructions to colleagues and other cooperating parties in order to reach the desired outcome of a technological project or achieve set goals within an organisation dealing with technology.analyse business requirementsanalyse business requirementsStudy clients' needs and expectations for a product or service in order to identify and resolve inconsistencies and possible disagreements of involved stakeholders.implement a management systemimplement a management systemMake and monitor the changes in business processes that are needed to create a system that collectively manage different parts of the business of an organisation.perform project managementperform project managementManage and plan various resources, such as human resources, budget, deadline, results, and quality necessary for a specific project, and monitor the project's progress in order to achieve a specific g...build business relationshipsbuild business relationshipsEstablish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the orga...train employeestrain employeesLead and guide employees through a process in which they are taught the necessary skills for the perspective job. Organise activities aimed at introducing the work and systems or improving the perform...manage keys for data protectionmanage keys for data protectionSelect appropriate authentication and authorization mechanisms. Design, implement and troubleshoot key management and use. Design and implement a data encryption solution for data at rest and data in ...
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
72/ 100
High Risk
Low riskHigh risk