Experience levels
- Level 1: < 5 years of experience
- Level 2: 5– < 10 years of experience
- Level 3: 10+ years of experience
Responsibilities could include but are not limited to
- Review, analyze, and/or apply:
- Network scanners and vulnerability analysis tools such as SATAN, ISS, Portscan & NMap
- Reporting and resolution procedures for IT Security incidents (for example DOS attacks) and International IT Security incident advisory services
- Networking Protocols such as HTTP, FTP, Telnet
- Internet security protocols such as SSL, S-HTTP, S-MIME, IPSec, SSH
- TCP/IP, UDP, DNS, SMTP, SNMP
- Intrusion detection systems, firewalls, content checkers and antivirus software
- Network infrastructure components, such as multiplexers, routers/hubs, switches
- Provide incident analysis support, including:
- Response mechanisms
- Co-ordination of all prevention and response plans
- Emergency Operations Centre (EOC) activities
- Co-ordination with the national Integrated Threat Assessment Centre and Government Operations Centre
- Participation in the Integrated National Security Framework and National Cyber Security Strategy
- Collect, collate, analyze and disseminate public domain information related to networked computer threats and vulnerabilities, security incidents and incident responses
- Conduct on-site reviews and analysis of system security logs
- Produce system activity reports,logs and incident analysis
- Assist in managing and running an incident response centre
- Complete tasks directly supporting the departmental IT Security and Cyber Protection Program
- Develop and deliver training material relevant to the resource category
Specialties could include but are not limited to
- SSL,
- S-HTTP
- HTTP
- FTP
- Telnet
- S-MIME
- IPSec
- X.400/X.500 Directory Standards
- X.509 Certificate Protocols
- TCP/IP
- UDP
- DNS
- SMTP
- SNTP