Back to Explore
TASK
Information Security Engineers
ID
work_computer_mathematical/information_security_engineers
Type
TASK
Children
20
Child Nodes (20)
ATOMIC
Identify security system weaknesses, using penetration tests.
ATOMIC
Coordinate monitoring of networks or systems for security breaches or intrusions.
ATOMIC
Assess the quality of security controls, using performance indicators.
ATOMIC
Train staff on, and oversee the use of, information security standards, policies, and best practices.
ATOMIC
Scan networks, using vulnerability assessment tools to identify vulnerabilities.
ATOMIC
Develop response and recovery strategies for security breaches.
ATOMIC
Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
ATOMIC
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
ATOMIC
Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
ATOMIC
Identify or implement solutions to information security problems.
ATOMIC
Develop information security standards and best practices.
ATOMIC
Recommend information security enhancements to management.
ATOMIC
Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
ATOMIC
Coordinate vulnerability assessments or analysis of information security systems.
ATOMIC
Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
ATOMIC
Troubleshoot security and network problems.
ATOMIC
Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
ATOMIC
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
ATOMIC
Write reports regarding investigations of information security breaches or network evaluations.
ATOMIC