Design And Develop

7.1 Critical Infrastructure Engineer


Basic Job Description

Designs, builds, deploys, and maintains the information technology (IT) infrastructure; ensures all IT systems support the organization operate efficiently.

Cyber Security Related Tasks

  • Define and review an organization’s information systems, configurations, and controls, and ensure security requirements recognize appropriate disaster recovery plans and business continuity functions, including any failover or backup requirements for system restoration;
  • Plan, research, and design robust solutions for systems and networks;
  • Ensure acquired or developed systems are consistent with cyber security policies and practices;
  • Conduct routine preventative maintenance of network infrastructure including implementing software, updates, and examine and address potential gaps in infrastructure, and cyber threats;
  • Conduct vulnerability testing, risk and security assessments;
  • Document network malfunctions and corresponding actions taken to ensure a detailed record of activity;
  • Analyze and recommend improvements and changes to computing environments;
  • Maintain security of system and inter-application information transfers;
  • Enhance, plan capacity, and design related to infrastructure engineering projects;
  • Prepare technical reports that document the system development process;
  • Document and address an organization’s information systems engineering requirements throughout the system life cycle;
  • Advise on security requirements and risk management process activities and other related documents;
  • Conduct security reviews and advise on business continuity plans, and contingency and disaster recovery plans;
  • Develop project reports, assessments, and other relevant documents;
  • Respond to security-related incidents and provide a thorough post-event analysis; and
  • Define, develop, implement, and maintain infrastructure policies, standards, and procedures; and
  • Develop, deliver, and oversee training material and educational efforts.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education in a cyber or IT related field (e.g., Computer Engineering, Computer Science, or equivalent);
  • Previous training and experience in cyber security or IT security infrastructure is preferred – 3 years of experience for entry-level; 5-10 years of experience for advanced-level. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, system protocols, cyber security-enabled software;
  • Security engineering models;
  • Cryptography and cryptographic key management concepts;
  • Virtual Private Network devices and encryption;
  • Engineering concepts and practices as applied to computer architecture;
  • Security architecture concepts and enterprise architecture reference models;
  • Security assessment and authorization processes;
  • Authentication, authorization, and access control methods;
  • System testing and evaluation methodologies and processes;
  • Application security system concepts and functions;
  • System life cycle management principles, including software security and usability;
  • Networking protocols and design processes;
  • Industry standards and organizationally accepted analysis principles and methods;
  • Configuring and using software-based computer protection tools; and
  • Designing hardware and software solutions.

Key Proficiencies

Research, Analytical, Attention to Detail, Problem-solving, Organizational, interpersonal, Communication skills

7.2 Requirements Analyst


Basic Job Description

Evaluates functional and security requirements of controls and systems, and translates requirements into cyber security solutions.

Cyber Security Related Tasks

  • Define project scope and objectives based on organization’s goals and activities;
  • Conduct research and analysis to develop, document, and refine functional and security requirements of controls and systems;
  • Ensure functional and security requirements are consistent with organization’s cyber security policies and practices and applicable industry guidelines;
  • Consult with management and colleagues to evaluate functional and security requirements;
  • Translate functional and security requirements into cyber security solutions;
  • Develop and document functional and security requirements, capabilities, and constraints for design and develop procedures and processes;
  • Coordinate with Security Architects, Security Engineers, and Developers, as needed, to provide oversight in the development of cyber security solutions;
  • Oversee and make recommendations regarding implementation of security controls and systems based on functional and security requirements;
  • Identify and document risks related to cyber security solutions and organization activities;
  • Develop or contribute to risk assessments of controls and systems and related cyber security solutions;
  • Conduct analysis to determine opportunities for new and improve organization cyber security solutions; and
  • Develop and document system security concept of operations.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education diploma in a cyber or IT related field (e.g., Computer Engineering, Computer Science or equivalent);
  • Certifications an asset: Global Information Assurance Certification (GIAC); Computing Technology Industry Association (CompTIA); Certified Information Systems Security Professional (CISSP); and
  • Individuals typically employed in this role have extensive experience in cyber security activities. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, power supply technology, system protocols, cyber security-enabled software;
  • Cryptography and cryptographic key management concepts;
  • Virtual Private Network devices and encryption;
  • Engineering concepts and practices as applied to computer architecture;
  • Security architecture concepts and enterprise architecture reference models;
  • Network access, identity, and access management;
  • Secure configuration management techniques;
  • Security assessment and authorization processes;
  • Capabilities and requirements analysis;
  • Authentication, authorization, and access control methods;
  • System testing and evaluation methodologies and processes;
  • Application security system concepts and functions;
  • System life cycle management principles, including software security and usability;
  • Functionality, quality, and security requirements and how these apply to specific items and tools;
  • Networking protocols and design processes;
  • Industry standards and organizationally accepted analysis principles and methods; and
  • Controls related to the use, processing, storage and transmission of data.

Key Proficiencies

Research, Analytical, Problem-solving, Interpersonal, Communication skills

7.3 Security Architect


Basic Job Description

Designs, develops and oversees the implementation of network and computer security structures for an organization, ensuring security requirements are adequately addressed in all aspects of the infrastructure, and the system supports an organization’s processes.

Cyber Security Related Tasks

  • Define and review an organization’s technology and information systems, and ensure security requirements recognize appropriate disaster recovery plans and business continuity functions, including any failover or backup requirements for system restoration;
  • Plan, research, and develop robust security architectures for systems and networks;
  • Research current and emerging technologies to understand capabilities of required networks or systems;
  • Prepare cost estimates and identify integration issues;
  • Conduct vulnerability testing, risk analyses and security assessments;
  • Research and develop a system security context, and define security assurance requirements based on industry standards and cyber security policies and practices;
  • Ensure the acquired or developed systems and architectures are consistent with an organization’s cyber security policies and practices;
  • Perform security reviews and identify gaps or determine the capability of security architectures and designs (e.g., firewall, virtual private networks, routers, servers, etc.), and develop a security risk management plan;
  • Prepare technical reports that document the architecture development process;
  • Document and address an organization’s information security, cyber security architecture, and systems security engineering requirements throughout a system life cycle;
  • Advise on security requirements and risk management process activities;
  • Respond immediately to security incidents and provide a thorough post-event analysis; and
  • Update and upgrade security systems as needed.

Commonly Requested Education, Training and Work Experience

  • Post-secondary University Degree in Computer Engineering or related discipline. Cyber or IT security specialization preferred;
  • Certifications an asset: Global Information Assurance Certification (GIAC); Computing Technology Industry Association (CompTIA); Certified Information Systems Security Professional (CISSP); CISSP- Information Systems Security Architecture Professional (ISSAP); and
  • Previous training and experience in IT security infrastructure, requirements analysis or program management is preferred – 5-10 years of relevant IT experience for advanced-level. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, system protocols, cyber security-enabled software;
  • Cryptography and cryptographic key management concepts;
  • Virtual Private Network devices and encryption;
  • Engineering concepts and practices as applied to computer architecture;
  • Security architecture concepts and enterprise architecture reference models;
  • Security assessment and authorization processes;
  • Authentication, authorization, and access control methods;
  • System testing and evaluation methodologies and processes;
  • Application security system concepts and functions;
  • System life cycle management principles, including software security and usability;
  • Networking protocols and design processes;
  • Industry standards and organizationally accepted analysis principles and methods;
  • Security compliance frameworks;
  • Configuring and using software-based computer protection tools; and
  • Designing hardware and software solutions.

Key Proficiencies

Research, Analytical, Problem-solving, Interpersonal, Communication skills

7.4 Security Engineer


Basic Job Description

Develops and maintains robust security solutions for an organization’s networks and systems, ensuring security requirements are adequately addressed in all aspects of system design based on industry standards and practices, and organization policies and procedures, and advises on security-related issues and vulnerabilities through all phases of the system life cycle.

Cyber Security Related Tasks

  • Define and review an organization’s technology and information systems, configurations, and controls, and ensure security requirements recognize appropriate disaster recovery plans and business continuity functions, including any failover or backup requirements for system restoration;
  • Plan, research, and design robust security solutions for systems and networks;
  • Conduct vulnerability testing, risk and security assessments;
  • Investigate intrusion incidents, conduct forensic investigations and mount incident responses;
  • Collaborate with colleagues on authentication, authorization and encryption solutions;
  • Research and evaluate new technologies and processes that enhance security capabilities;
  • Research and develop a system security context and define system security requirements based on industry standards and cyber security policies and practices;
  • Ensure acquired or developed systems are consistent with cyber security policies and practices;
  • Conduct security reviews and identify gaps in security architectures and designs (e.g., firewall, virtual private networks, routers, servers, etc.);
  • Prepare technical reports that document the system development process;
  • Document and address an organization’s information security and systems security engineering requirements throughout the system life cycle;
  • Advise on security requirements and risk management process activities and other related documents;
  • Conduct security reviews and advise on business continuity plans, and contingency and disaster recovery plans;
  • Respond to security-related incidents and provide a thorough post-event analysis; and
  • Update and upgrade security systems as needed.

Commonly Requested Education, Training and Work Experience

  • Post-secondary University degree in Computer Engineering, Computer Science or related discipline. Cyber or IT security specialization preferred;
  • In Canada, the term "engineer" means a licensed professional engineer as defined in the provincial jurisdiction. Accordingly, all security engineers must be licensed to practice engineering within their jurisdiction;
  • Certifications an asset: Global Information Assurance Certification (GIAC); Certified Information Systems Security Professional (CISSP); CISSP- Information Systems Security Engineering Professional (ISSEP); and
  • Previous training and experience in IT security infrastructure, requirements analysis or program management is preferred – 5-10 years of experience for advanced-level. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, system protocols, cyber security-enabled software;
  • Security engineering models;
  • Cryptography and cryptographic key management concepts;
  • Virtual Private Network devices and encryption;
  • Engineering concepts and practices as applied to computer architecture;
  • Security architecture concepts and enterprise architecture reference models;
  • Security assessment and authorization processes;
  • Authentication, authorization, and access control methods;
  • System testing and evaluation methodologies and processes;
  • Application security system concepts and functions;
  • System life cycle management principles, including software security and usability;
  • Networking protocols and design processes;
  • Industry standards and organizationally accepted analysis principles and methods;
  • Security compliance frameworks;
  • Configuring and using software-based computer protection tools; and
  • Designing hardware and software solutions.

Key Proficiencies

Research, Analytical, Problem-solving, Interpersonal, Communication skills

7.5 Cyber Security Researcher


Basic Job Description

  • Researches and evaluates current and emerging technology to develop capabilities, ensuring cyber security is fully integrated; and
  • Engages and maintains a professional research network aligned to organizational requirements.

Cyber Security Related Tasks

  • Research current and emerging technologies to understand capabilities of required networks or systems;
  • Design and develop new tools or technologies as they relate to cyber security;
  • Collaborate with colleagues to identify and develop appropriate technology solutions;
  • Follow software and systems engineering life cycle standards and processes;
  • Troubleshoot prototype design and process issues throughout product development phases;
  • Evaluate network or system vulnerabilities to enhance capabilities being developed;
  • Document and present research findings to appropriate stakeholders;
  • Participate in research and development forums and related events; and
  • Develop, deliver, and oversee training material and educational efforts.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education in a cyber or IT related field (e.g., Computer Science, Computer Engineering or equivalent);
  • Certifications an asset: Global Information Assurance Certification (GIAC); Certified Information Systems Security Professional (CISSP); and
  • Previous training and experience in security operation roles or security testing and evaluation activities. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, system protocols, cyber security-enabled software;
  • Cryptography and cryptographic key management concepts;
  • Current and emerging technology and cyber security technologies;
  • System life cycle management principles, including software security and usability;
  • Critical infrastructure systems;
  • Network security architecture concepts including topology, protocols, components, and principles;
  • Operating system structures and internals;
  • Network analysis tools;
  • Applying engineering concepts and processes;
  • Creating and using mathematical models; and
  • Designing technology processes and solutions.

Key Proficiencies

Research, Analytical, Problem-solving, Interpersonal, Communication skills

7.6 Security Tester & Evaluator


Basic Job Description

Plans, prepares, and executes tests of security devices, operating systems, software and hardware to evaluate results against defined specifications, policies, and requirements, and documents results and makes recommendations that can improve information confidentiality, integrity, and availability.

Cyber Security Related Tasks

  • Tests, evaluates, and verifies systems under development; systems exchanging electronic information with other systems; related operating system software and hardware; and security controls and devices used within an organization to determine level of compliance with defined specifications, policies, and requirements;
  • Analyze test results of operating systems, software, and hardware and make recommendations based on findings;
  • Develop test plans to address specifications, policies, and requirements;
  • Validate specifications, policies and requirements for testability;
  • Create verifiable evidence of security measures;
  • Prepare assessments that document the test results and any security vulnerabilities present;
  • Deploy, validate, and verify network infrastructure device operation system software; and
  • Develop, deliver, and oversee training material and educational efforts.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education in a cyber or IT related field (e.g., Computer Engineering, Computer Science or equivalent);
  • Certifications an asset: Certified Information Systems Security Professional (CISSP); and
  • Training and experience in an IT security role associated with system and/or software security measurement such as vulnerability assessment, software security. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, system protocols, cyber security-enabled software;
  • Conducting independent validation and verification security testing;
  • Systems testing and evaluation methods and techniques;
  • Security assessment and authorization processes;
  • Security architecture concepts and enterprise information security architecture models;
  • Identifying test and evaluation policies and requirements;
  • Collect, analyze, verify and validate test data and translate data and test results into conclusions;
  • Designing and document test and evaluation strategies; and
  • Writing technical and test and evaluation reports.

Key Proficiencies

Analytical, Problem-solving, Attention to Detail, Interpersonal, Communication skills

7.7 Supply Chain Integrity Analyst


Basic Job Description

Collect and analyze data to identify cyber security flaws and vulnerabilities in an organization’s supply chain operations, and to provide advice and guidance to help reduce these supply chain risks.

Cyber Security Related Tasks

  • Collect and analyze supply chain relevant information to identify and mitigate flaws and vulnerabilities, including component integrity, in an organization’s computer networks or systems;
  • Analyze system hardware and software configurations;
  • Recommend hardware, software, and countermeasures to install or update based on cyber threats and security vulnerabilities;
  • Coordinate with colleagues to implement changes and new systems;
  • Track and report on cyber threats and security vulnerabilities that impact supply chain performance;
  • Define, develop, implement, and maintain cyber security policies and procedures;
  • Ensure compliance with cyber security policies, regulations, and procedures of the organization;
  • Ensure compliance with security requirements of organization networks and systems; and
  • Develop and maintain risk assessments and related reports on vendors and products and services, based on reliability and credibility.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education in a cyber or IT related field (e.g.; Business Administration, Computer engineering, Computer Science, Information Technology or equivalent); and
  • Previous training and experience in cyber security preferred.
  • Individuals employed in this role can have diverse levels of cyber security expertise. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Information and data analysis techniques;
  • A working knowledge of cyber security and privacy principles and methods; (e.g., firewalls, encryption, virtual private network devices);
  • Technical knowledge to understand data security and integrity, security requirements, and the functional and technical design of networks and system, and cyber security solutions;
  • Risk management processes, responsibilities and authorities;
  • System life cycle management principles, including software security and usability;
  • Configuration management related to cyber security;
  • Applicable laws, regulations and guidelines as they relate to cyber security; and
  • Develop risk and threat assessments.

Key Proficiencies

Analytical, Problem-solving, Attention to Detail, Organizational, Time Management, Interpersonal, Communication skills

7.8 Application Developer


Basic Job Description

Designs, develops, tests, and improves software and applications aimed at helping an organization complete tasks or programs.

Cyber Security Related Tasks

  • Research, analyze and implement secure application development techniques;
  • Develop, implement, and modify applications using scientific analysis and mathematical models;
  • Analyze code requirements to determine time and cost constraints, and risks to organization;
  • Develop and conduct application testing and validation procedures, programming, and secure coding, and report on functionality and resiliency;
  • Conduct vulnerability scans and reviews on applications, and examine controls and measures required to protect applications;
  • Conduct testing of applications to ensure desired information is produced and security levels and procedures are correct;
  • Prepare documentation on applications and subsequent revisions;
  • Update and upgrade applications as needed to correct errors, and to improve performance and interfaces;
  • Prepare reports on applications patches or releases that would leave systems vulnerable;
  • Develop countermeasures against potential exploitations of vulnerabilities in applications;
  • Perform risk analysis whenever an application undergoes a change; and
  • Provide advice and guidance, and coordinate efforts on application security procedures to protect sensitive data from threats and vulnerabilities.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education in a cyber or IT related field (e.g., Computer Engineering, Computer Science, or equivalent). A Master’s degree is preferred;
  • Previous training and experience in developing and designing applications is preferred – 2-3 years of experience for entry-level; 5-10 years of experience for advanced-level. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, system protocols, cyber security-enabled software;
  • Application security system concepts and functions;
  • Software and system design tools, methods, and techniques;
  • Software analysis methodologies, testing and protocols;
  • Secure coding and configuration techniques;
  • Cryptography and cryptographic key management concepts;
  • Computer architecture, data structures, and algorithms;
  • Linear/matrix algebra and/or discrete mathematics;
  • Probability theory and information theory;
  • C, C++, Java, Python, and similar computer programming languages;
  • Principles in computer programming, software design and debugging, and testing;
  • System life cycle management principles, including software security and usability;
  • Creating or tailoring programs and code for application specific concerns;
  • System testing and evaluation methodologies and processes;
  • Conducting vulnerability scans and recognizing vulnerabilities in security systems;
  • System, application and data security threats, risks and vulnerabilities;
  • Designing countermeasures to identified security risks;
  • Industry standards and organizationally accepted analysis principles and methods; and
  • Develop and conduct risk or impact assessments, business cases, and risk management documents.

Key Proficiencies

Research, Analytical, Problem-solving, Interpersonal, Communication skills

7.9 Information Systems Security Developer


Basic Job Description

Develops, creates, integrates, tests, and maintains information system security throughout the systems life cycle, and reports on information system performance in providing confidentiality, integrity, and availability and recommends corrective action to address deficiencies.

Cyber Security Related Tasks

  • Define and review an organization’s information systems, and ensure security requirements recognize appropriate disaster recovery plans and business continuity functions, including any failover or backup requirements for system restoration;
  • Analyze existing security systems and make recommendations for changes or improvements;
  • Plan, research, and implement secure information systems using scientific analysis and mathematical models;
  • Research current and emerging technologies to understand capabilities of required networks or systems;
  • Prepare cost estimates and constraints, and identify integration issues or risks to organization;
  • Research and develop a system security context, and define security assurance requirements based on industry standards and cyber security policies and practices;
  • Ensure the acquired or developed systems are consistent with an organization’s cyber security policies and practices;
  • Develop and conduct information system testing and validation procedures, programming, and secure coding, and report on functionality and resiliency;
  • Conduct vulnerability testing and security reviews on information systems or networks to identify gaps, and examine controls and measures required to protect the confidentiality and integrity of information under different operating conditions;
  • Conduct tests of information systems to ensure security levels and procedures are correct and develop a security risk management plan;
  • Develop disaster recovery and continuity of operations plans for information systems under development;
  • Prepare technical reports that document system development process and subsequent revisions;
  • Document and address an organization’s information security, cyber security architecture, and systems security engineering requirements throughout a system life cycle;
  • Update and upgrade information systems as needed to correct errors, and to improve performance and interfaces;
  • Prepare reports on information systems patches or releases that would leave networks or systems vulnerable;
  • Develop countermeasures and risk mitigation strategies against potential exploitations of vulnerabilities in networks or systems;
  • Perform risk analysis whenever a system undergoes a change; and
  • Provide advice and guidance, and coordinate efforts on risk management and disaster recovery procedures to protect sensitive data from threats and vulnerabilities.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education in a cyber or IT related field (e.g., Computer Science, Mathematics, Network Technology, Computer Engineering or equivalent);
  • Certifications an asset: Certified Secure Software Lifecycle Professional (CSSLP); and
  • Previous training and experience in system development and support is preferred – five years of experience. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, system protocols, cyber security-enabled software;
  • Principles in information security, engineering, networking, mathematics;
  • Cryptography and cryptographic key management concepts;
  • Concepts in operating systems, microprocessors, network access, identity and access management, penetration testing;
  • Data security conceptions and functions, analysis methodologies, testing, and protocols;
  • System design tools, methods, and techniques;
  • Secure coding and configuration techniques;
  • Computer architecture, data structures, and algorithms;
  • Probability theory and information theory;
  • C, C++, Java, Python, and similar computer programming languages;
  • System life cycle management principles, including software security and usability;
  • System testing and evaluation methodologies and processes;
  • Conducting vulnerability scans and recognizing vulnerabilities in security systems;
  • Networking protocols and design processes;
  • System, application and data security threats, risks and vulnerabilities;
  • Designing countermeasures to identified security risks;
  • Risk management policies, requirements, and practices;
  • Business continuity and disaster response planning;
  • Cost/benefit analysis;
  • A working knowledge of cyber security principles and elements;
  • Industry standards and organizationally accepted analysis principles and methods; and
  • Develop and conduct risk or impact assessments, business cases, and risk management documents.

Key Proficiencies

Research, Analytical, Problem-solving, Interpersonal, Communication skills

7.10 Secure Software Developer


Basic Job Description

Develops, creates, integrates, and maintains security software, applications or specialized programs, and reports on software/data security achievements and recommends corrective action to address deficiencies.

Cyber Security Related Tasks

  • Research, analyze and implement secure application development techniques;
  • Develop, implement, and modify software systems or applications using scientific analysis and mathematical models;
  • Analyze software requirements to determine time and cost constraints, and risks to organization;
  • Develop and conduct software system or application testing and validation procedures, programming, and secure coding, and report on functionality and resiliency;
  • Conduct vulnerability scans and reviews on software systems or applications, and examine controls and measures required to protect software systems or applications;
  • Conduct tests of software systems or applications to ensure desired information is produced and security levels and procedures are correct;
  • Prepare reports on system or application developments and subsequent revisions;
  • Update and upgrade software systems or applications as needed to correct errors, and to improve performance and interfaces;
  • Prepare reports on software systems or applications patches or releases that would leave systems vulnerable;
  • Develop countermeasures against potential exploitations of vulnerabilities in systems;
  • Perform risk analysis whenever an application or system undergoes a change; and
  • Provide advice and guidance, and coordinate efforts on application security procedures to protect sensitive data from threats and vulnerabilities.

Commonly Requested Education, Training and Work Experience

  • Post-secondary education in a cyber or IT related field (e.g., Computer Science, Mathematics, Network Technology, Computer Engineering or equivalent);
  • Certifications an asset: Certified Secure Software Lifecycle Professional (CSSLP); and
  • Previous training and experience in software development or coding is preferred – five years of experience. Requested experience will depend on the organizational need.

Primary Training Requirements – Learning Outcomes

  • Technical knowledge of networks, computer components, power supply technology, system protocols, cyber security-enabled software;
  • Principles in computer programming, software design and debugging, and penetration testing;
  • Application security system concepts and functions;
  • Data security conceptions and functions;
  • Software and system design tools, methods, and techniques;
  • Software/data security analysis methodologies, testing and protocols;
  • Secure coding and configuration techniques;
  • Computer architecture, data structures, and algorithms;
  • Linear/matrix algebra and/or discrete mathematics;
  • Probability theory and information theory;
  • C, C++, Java, Python, and similar computer programming languages;
  • Creating or tailoring programs and code for application specific concerns;
  • Conducting vulnerability scans and recognizing vulnerabilities in security systems;
  • System, application and data security threats, risks and vulnerabilities; and
  • Designing countermeasures to identified security risks.

Key Proficiencies

Research, Analytical, Problem-solving, Interpersonal, Communication skills

Date modified: