ANZSCO 262112  ICT Security Specialist acs rpl report

ANZSCO 262112- ICT Security Specialist

Description

The ICT Security Specialist needs to manage, develop and cater to the ICT policy as set by the organization. They need to develop the preventive measures as set by the recovery strategy to determine the minimum risk regarding security threat for internal and external systems. The security specialists make sure to conduct a thorough research and implement the security measures to prevent your computer system from any kind of unauthorized damage. This is one of the most essential roles in the organization.

Skill Level

1

Alternative Titles

Security Administrator

Specialisations

Information Technology Security Manager

Skill Assessment Authority

ACS (Australian Computer Society)

Occupations List

ICT Security Specialist is mentioned in the following lists

  • Combined Skilled Occupations List (STSOL MLTSSL)
  • Medium Long Term Strategic Skills List (MLTSSL)
  • RSMS Occupations List (RSMSL)

The occupation does not feature in the following list

  • Labor Market Testing Required for 457 List (LMTL)
  • Short Term Skilled Occupation List (STSOL)

Visa Provision

Since the occupation features in STSOL, the candidates can apply for the following visas

  • Skilled Nominated 190
  • Skilled Regional Nominated 489

The candidates can also apply for employer sponsor visa under GSM Program. An important thing to note is that since the job features in STSOL, the job may not always be in demand. As a result, candidates trying to move to Australia should prefer checking the employer sponsor.

Security Specialist

Unit Group: 2621 Database and Systems Administrators, and ICt Security Specialist

Description

The ICT specialist in Australia makes sure to develop, create a plan and manage the organizational security accordingly. Ranging from operating systems to database management, they make sure to maintain the security policy for all the systems. This helps them maintain the system integrity, and security. They are also responsible for carrying out backup, thereby improving performance of the system.

Tasks

  • Creating, and maintaining the document, policy, strategy, and instruction, recording and storing it in the system logs for operational process
  • Offering service support to detect flaws in the system and solving the hardware and software issues such as malfunctions, strengthening the communication infrastructure
  • Working with external resources, vendors, service providers to install, maintain and determine the functionality of the software security applications
  • Checking database system and upgrades and conducting debugging, tracking and solving the existing flaws in the system, upgrading the system.
  • Implementing and carrying out preventive measures to protect the risk of security threats in the system.

Skill level

The candidates applying for this job position should have the following skills

Bachelor's degree or higher qualification

Relevant 5 years of experience or vendor certification

Some of the firms may even ask for the job training certificate

Occupations in this group

  • 2621111 Database Administrator
  • 262112 ICT Security Specialist
  • 262113 Systems Administrators

English Requirement

A minimum of the following score in the exams is required

  • IELTS- 7 (L, R, W), 6 (speaking), 6 (overall)
  • OET- B (all sections)
  • TOEFL iBT- L:12, R:13, W: 21, S:23, L93
  • PTE Academics- 50 (L, R, W), 65 (Speaking), 65 (overall)

Exceptions

  • Australian Graduate Exceptions can apply in some states and territories
  • Priority Skilled List may be an essential requirement in some states or territories
  • Candidates from countries like UK, Canada, US, Ireland and New Zealand do not need to provide the IELTS or OET score.

However, the candidates may require to send the IELTS equivalent or higher result to meet the essential firm requirements

Closely Related Core ICT Units

  • Computer Forensics
  • Database Design
  • Network Security
  • Operating Systems- Unix, Xenix, Linux, Network OS
  • Web Security
  • Internet and The Web
  • Database Implementation
  • Information Systems Security
  • Database Encryption

Additional Closely Related ICT Units

  • Client Server Technology
  • File Processing
  • Project Management
  • Quality Management- Software Quality, Quality Assurance
  • Distributed Systems
  • File Processing
  • Data Structures
  • Data Policy
  • Critical Path Method

Introduction to ICT-Introduction to Computer Science, Computer Theory, Introduction to Business Computing, Computer Science I