The Computer Security Specialists plan, coordinate, and implement security measures for information systems to regulate access to computer date files and prevent unauthorized modifications, destruction, or disclosure of information.
The Computer Security Specialists encrypts data transmissions and erects firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers. The Computer Security Specialists develops plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosures and to meet emergency data processing needs. The Computer Security Specialists reviews violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. The Computer Security Specialists monitors use of data files and regulate access to safeguard information in computer files. The Computer Security Specialists monitor current reports of computer viruses to determine when to update virus protection systems. The Computer Security Specialist modifies security files to incorporate new software, correct errors, or change individual access status. The Computer Security Specialist performs risk assessments and executes tests of data processing system to ensure functioning of data processing activities and security measures. The Computer Security Specialist confers with users to discuss issues such as computer data access needs, security violations, and programming changes. The Computer Security Specialist trains users and promote security awareness to ensure system security and to improve server and network efficiency. The Computer Security Specialist coordinates implementation of computer system plan with establishment personnel and outside vendors.
The Computer Security Specialist needs knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming. The Computer Security Specialist needs knowledge of transmission, switching, control, and operation of telecommunications systems. The Computer Security Specialist needs knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources. The Computer Security Specialist needs knowledge of structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar. The Computer Security Specialist needs knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects. The Computer Security Specialist needs knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services. The Computer Security Specialist needs knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions. The Computer Security Specialist needs knowledge of media production, communication, and dissemination techniques and methods. This includes alternative ways to inform and entertain via written, oral, and visual media. The Computer Security Specialist needs knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
The Computer Security Specialist needs the skill of understanding the implications of new information for both current and future problem solving and decision making. The Computer Security Specialist needs the understanding written sentences and paragraphs in work related documents. The Computer Security Specialist identifies measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system. The Computer Security Specialist uses logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. The Computer Security Specialist must have the skill to give full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times. The Computer Security Specialist determines how a system should work and how changes in conditions, operations, and the environment will affect outcomes. The Computer Security Specialist determines causes of operating errors and decides what to do about them. The Computer Security Specialist considers the relative costs and benefits of potential actions to choose the most appropriate one. The Computer Security Specialist must be able to communicate effectively in writing as appropriate for the needs of the audience. They need the ability to read and understand information and ideas that are presented to them in writing.