Self Assessment Tool

Compose your own Professional Profile, find  the best matching ICT Profiles and choose the certificates that could help you to meet your aspirations.

Start your self-assessment by clicking the button.

Start self-assessment tool

ICT Roles


RoleProfile

 

As a response to the huge number of ICT Profile Frameworks and Profile descriptions used today in European ICT Business and Qualification systems, the CEN Workshop on ICT Skills created a number of representative ICT Profiles covering, at their level of granularity, the full ICT Business process.The profiles may be used for reference, or for the basis to develop further profile generations, by European stakeholders. Structured from six main ICT Profile families, these Profiles reflect the top of a European ICT Profiles family tree. The concept devised is broadly analogous to human genetics where the genes of one generation pass down to the next. In the same way it is envisaged that the core components of the 23 Generation 2 Profiles will pass down to profiles constructed to meet specific stakeholder requirements.These ICT Profiles have been published in the CEN Workshop Agreement CWA 16458.

 

 

The 23 Profiles combined with e-competences from the e-CF, provide a gene pool for the development of tailored profiles that may be developed by European ICT sector players in specific contexts and with higher levels of granularity.

Profile title ICT SECURITY SPECIALIST
Summary statement Ensures the implementation of the organizations security policy.
Mission Proposes and implements necessary security updates. Advises, supports, informs and provides training and security awareness. Takes direct action on all or part of a network or system. Is recognized as the ICT technical security expert by peers.
Deliverables
Accountable Responsible Contributor
  • Knowledge or Information Base
  • New technology integration proposal
  • Risk Management Plan
  • Information Security Policy
  • Risk Management Policy
Main task(s)
  • Ensure security and appropriate use of ICT resources
  • Evaluate risks, threats and consequences
  • Provide security training and education
  • Provide technical validation of security tools
  • Contribute to definition of security standards
  • Audit security vulnerability
  • Monitor security developments to ensure data and physical security of the ICT resources
  • E-competences
    C.2 Change Support
    Level 3
    C.3 Service Delivery
    Level 3
    D.9 Personnel Development
    Level 3
    D.10 Information and Knowledge Management
    Level 3
    E.8 Information Security Management
    Level 3
    KPI area Security measures in place

    Back to list