ICT Security Consultant
ICT security consultants advise and implement solutions to control access to data and programs. They promote a safe exchange of information.
ICT security consultants advise and implement solutions to control access to data and programs. They promote a safe exchange of information.
ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all
Knowledge engineers integrate structured knowledge into computer systems (knowledge bases) in order to solve complex problems normally requiring a high level of human expertise or
ICT network architects design the topology and connectivity of ICT network such as hardware, infrastructure, communication and hardware components.
ICT network engineers implement, maintain and support computer networks. They also perform network modelling, analysis, and planning. They may also design network and computer security
Chief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all
Digital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden,
Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result
Database integrators perform integration among different databases. They maintain integration and ensure interoperability.
Data warehouse designers are responsible for planning, connecting, designing, scheduling, and deploying data warehouse systems. They develop, monitor and maintain ETL processes, reporting applications and