Job description Information Technology (IT) Project Manager - Cybersecurity in the Cariboo Region
Find out what work is like for an information technology (IT) project manager - cybersecurity in Canada. This work description is applicable to all Information systems analysts and consultants (NOC 21220).
Cybersecurity specialists
Description
Cybersecurity specialists develop, plan, recommend, implement, improve and monitor security measures to protect an organization's computer networks, connected devices and information to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of the information or of the systems on which the information resides. They are employed in information technology consulting firms and in information technology units throughout the public and private sectors.
Work week duration
Cybersecurity specialists usually work between 35 to 40 hours per week.Job duties
Here are some of the main activities and tasks that Cybersecurity specialists have to perform, and some of the physical demands they involve:
- Confer with clients to identify and document requirements, assess physical and technical security risks to data, software and hardware
- Apply encryption protocols, and manage keys to ensure security of data is maintained while at rest and in transit
- Monitor access and credentials for information and systems
- Install, test and operate security software and tools such as anti-virus and automated threat detection/prevent systems to ensure security measures are in place and working as intended
- Monitor for cyber attacks, intrusions and unusual, unauthorised or illegal activity
- Plan and carry out security measures in response to cybersecurity events and incidents in accordance with an organization's incident response plan to protect information, data and systems
- Document computer security and emergency measures policies, procedures, and tests.
Physical demands Help - Physical Demands
- Sitting
Workplaces and employers
Here are the typical workplaces where Cybersecurity specialists are employed and some of their main characteristics:
- Information technology consulting firms
- Self-employed
- Information technology departments in the private and public sectors
Work environment Help - Physical Work Environment
- Indoors, environmentally controlled
Physical proximity from others Help - Physical proximity from others
- Somewhat close (e.g. share office)
Related job titles
Here are some other related job titles that are found in the same occupational category (NOC 21220), and a list of similar occupations:
- cybersecurity analyst
- informatics security analyst
- informatics security consultant
- information technology (IT) security specialist
- systems security analyst
Similar occupations Help - Similar occupations
- Computer engineers (except software engineers and designers)
- Database analysts and data administrators
- Web developers and programmers
- Computer and information systems managers
- Information systems specialists
- Web designers
- Software developers and programmers
- Business systems specialists
- Software engineers and designers
- Computer systems developers and programmers
Sources Occupational and Skills Information System & National Occupational Classification
- Date modified: