- Assist in the development of online transaction or security policies.
Occupations with related tasks Save Table: XLSX CSV
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Conduct network and security system audits, using established criteria.
- Configure information systems to incorporate principles of least functionality and least access.
- Develop presentations on threat intelligence.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Identify security system weaknesses, using penetration tests.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
- Develop or maintain project reporting systems.
- Develop and write procedures for installation, use, or troubleshooting of communications hardware or software.
- Develop disaster recovery plans.
- Monitor and analyze network performance and reports on data input or output to detect problems, identify inefficient use of computer resources, or perform capacity planning.
- Coordinate network or design activities with designers of associated networks.
- Develop conceptual, logical, or physical network designs.
- Develop and implement solutions for network problems.
- Determine specific network hardware or software requirements, such as platforms, interfaces, bandwidths, or routine schemas.
- Communicate with system users to ensure accounts are set up properly or to diagnose and solve operational problems.
- Visit vendors, attend conferences or training sessions, or study technical journals to keep up with changes in technology.
- Evaluate network designs to determine whether customer requirements are met efficiently and effectively.
- Participate in network technology upgrade or expansion projects, including installation of hardware and software and integration testing.
- Adjust network sizes to meet volume or capacity demands.
- Prepare detailed network specifications, including diagrams, charts, equipment configurations, or recommended technologies.
- Develop network-related documentation.
- Estimate time and materials needed to complete projects.
- Supervise engineers or other staff in the design or implementation of network solutions.
- Coordinate network operations, maintenance, repairs, or upgrades.
- Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.
- Research and test new or modified hardware or software products to determine performance and interoperability.
- Communicate with customers, sales staff, or marketing staff to determine customer needs.
- Prepare design presentations and proposals for staff or customers.
- Design, build, or operate equipment configuration prototypes, including network hardware, software, servers, or server operation systems.
- Prepare or monitor project schedules, budgets, or cost control systems.
- Develop plans or budgets for network equipment replacement.
- Coordinate installation of new equipment.
- Explain design specifications to integration or test engineers.
- Use network computer-aided design (CAD) software packages to optimize network designs.
- Maintain or coordinate the maintenance of network peripherals, such as printers.
- Communicate with vendors to gather information about products, alert them to future needs, resolve problems, or address system maintenance issues.
- Maintain networks by performing activities such as file addition, deletion, or backup.
- Design, organize, and deliver product awareness, skills transfer, or product education sessions for staff or suppliers.
- Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
- Develop or maintain project reporting systems.
- Develop and write procedures for installation, use, or troubleshooting of communications hardware or software.
- Identify, standardize, and communicate levels of access and security.
- Evaluate testing routines or procedures for adequacy, sufficiency, and effectiveness.
- Develop testing routines and procedures.
- Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.
- Identify or document backup or recovery plans.
- Back up or modify applications and related data to provide for disaster recovery.
- Correct testing-identified problems, or recommend actions for their resolution.
- Determine sources of Web page or server problems, and take action to correct such problems.
- Implement updates, upgrades, and patches in a timely manner to limit loss of service.
- Implement Web site security measures, such as firewalls or message encryption.
- Collaborate with development teams to discuss, analyze, or resolve usability issues.
- Test issues such as system integration, performance, and system security on a regular schedule or after any major program modifications.
- Perform user testing or usage analyses to determine Web sites' effectiveness or usability.
- Document application and Web site changes or change procedures.
- Track, compile, and analyze Web site usage data.
- Test backup or recovery plans regularly and resolve any problems.
- Recommend Web site improvements, and develop budgets to support recommendations.
- Review or update Web page content or links in a timely manner, using appropriate tools.
- Install or configure Web server software or hardware to ensure that directory structure is well-defined, logical, and secure, and that files are named properly.
- Gather, analyze, or document user feedback to locate or resolve sources of problems.
- Set up or maintain monitoring tools on Web servers or Web sites.
- Monitor Web developments through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Develop or document style guidelines for Web site content.
- Develop Web site performance metrics.
- Collaborate with Web developers to create and operate internal and external Web sites, or to manage projects, such as e-marketing campaigns.
- Identify or address interoperability requirements.
- Develop or implement procedures for ongoing Web site revision.
- Check and analyze operating system or application log files regularly to verify proper system performance.
- Provide training or technical assistance in Web site implementation or use.
- Inform Web site users of problems, problem resolutions, or application changes and updates.
- Document installation or configuration procedures to allow maintenance and repetition.
- Test new software packages for use in Web operations or other applications.
- Develop and implement marketing plans for home pages, including print advertising or advertisement rotation.
- Evaluate or recommend server hardware or software.
- Administer internet or intranet infrastructure, including Web, file, and mail servers.
- Identify, standardize, and communicate levels of access and security.
- Evaluate testing routines or procedures for adequacy, sufficiency, and effectiveness.
- Develop testing routines and procedures.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Assess blockchain threats, such as untested code and unprotected keys.
- Automate the deployment of software updates over geographically distributed network nodes.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Design and develop blockchain technologies for industries such as finance and music.
- Design and implement dashboard and data visualizations to meet customer reporting needs.
- Design and implement data repositories to integrate data.
- Develop a maintainable code base using object-oriented design principles, practices, or patterns.
- Discuss and plan systems with solution architects, system engineers, or cybersecurity experts to meet customer requirements.
- Discuss data needs with engineers, product managers, or data scientists to identify blockchain requirements.
- Evaluate blockchain processes or risks based on security assessments or control matrix reviews.
- Evaluate new blockchain technologies and vendor products.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Update client and server applications responsible for integration and business logic.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Translate nursing practice information between nurses and systems engineers, analysts, or designers, using object-oriented models or other techniques.
- Apply knowledge of computer science, information science, nursing, and informatics theory to nursing practice, education, administration, or research, in collaboration with other health informatics specialists.
- Design, develop, select, test, implement, and evaluate new or modified informatics solutions, data structures, and decision-support mechanisms to support patients, health care professionals, and their information management and human-computer and human-technology interactions within health care contexts.
- Analyze and interpret patient, nursing, or information systems data to improve nursing services.
- Develop, implement, or evaluate health information technology applications, tools, processes, or structures to assist nurses with data management.
- Identify, collect, record, or analyze data relevant to the nursing care of patients.
- Use informatics science to design or implement health information technology applications for resolution of clinical or health care administrative problems.
- Provide consultation to nurses regarding hardware or software configuration.
- Analyze computer and information technologies to determine applicability to nursing practice, education, administration, and research.
- Read current literature, talk with colleagues, and participate in professional organizations or conferences to keep abreast of developments in informatics.
- Develop or deliver training programs for health information technology, creating operating manuals as needed.
- Disseminate information about nursing informatics science and practice to the profession, other health care professions, nursing students, and the public.
- Design, conduct, or provide support to nursing informatics research.
- Inform local, state, national, and international health policies related to information management and communication, confidentiality and security, patient safety, infrastructure development, and economics.
- Plan, install, repair, or troubleshoot telehealth technology applications or systems in homes.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Address the relationships of quantities, magnitudes, and forms through the use of numbers and symbols.
- Disseminate research by writing reports, publishing papers, or presenting at professional conferences.
- Maintain knowledge in the field by reading professional journals, talking with other mathematicians, and attending professional conferences.
- Apply mathematical theories and techniques to the solution of practical problems in business, engineering, the sciences, or other fields.
- Develop mathematical or statistical models of phenomena to be used for analysis or for computational simulation.
- Perform computations and apply methods of numerical analysis to data.
- Assemble sets of assumptions, and explore the consequences of each set.
- Develop new principles and new relationships between existing mathematical principles to advance mathematical science.
- Develop computational methods for solving problems that occur in areas of science and engineering or that come from applications in business or industry.
- Conduct research to extend mathematical knowledge in traditional areas, such as algebra, geometry, probability, and logic.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Document computer security and emergency measures policies, procedures, and tests.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
- Monitor use of data files and regulate access to safeguard information in computer files.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
- Train users and promote security awareness to ensure system security and to improve server and network efficiency.
- Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Modify existing databases and database management systems or direct programmers and analysts to make changes.
- Plan and install upgrades of database management system software to enhance database performance.
- Specify users and user access levels for each segment of database.
- Test changes to database applications or systems.
- Test programs or databases, correct errors, and make necessary modifications.
- Train users and answer questions.
- Provide technical support to junior staff or clients.
- Approve, schedule, plan, and supervise the installation and testing of new products and improvements to computer systems, such as the installation of new databases.
- Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
- Write and code logical and physical database descriptions and specify identifiers of database to management system, or direct others in coding descriptions.
- Develop data models describing data elements and how they are used, following procedures and using pen, template, or computer software.
- Select and enter codes to monitor database performance and to create production databases.
- Identify, evaluate and recommend hardware or software technologies to achieve desired database performance.
- Review procedures in database management system manuals to make changes to database.
- Identify and evaluate industry trends in database systems to serve as a source of information and advice for upper management.
- Review workflow charts developed by programmer analyst to understand tasks computer will perform, such as updating records.
- Revise company definition of data as defined in data dictionary.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
- Perform data backups and disaster recovery operations.
- Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
- Configure, monitor, and maintain email applications or virus protection software.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Analyze equipment performance records to determine the need for repair or replacement.
- Confer with network users about solutions to existing system problems.
- Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Design, configure, and test computer hardware, networking software and operating system software.
- Perform routine network startup and shutdown procedures, and maintain control records.
- Load computer tapes and disks, and install software and printer paper or forms.
- Train people in computer system use.
- Maintain logs related to network functions, as well as maintenance and repair records.
- Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
- Coordinate with vendors and with company personnel to facilitate purchases.
- Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system.
- Maintain an inventory of parts for emergency repairs.
- Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Design and implement Web site security measures, such as firewalls and message encryption.
- Write supporting code for Web applications or Web sites.
- Design, build, or maintain Web sites, using authoring or scripting languages, content creation tools, management tools, and digital media.
- Back up files from Web sites to local directories for instant recovery in case of problems.
- Select programming languages, design tools, or applications.
- Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.
- Develop databases that support Web applications and Web sites.
- Perform Web site tests according to planned schedules, or after any Web site or product revision.
- Perform or direct Web site updates.
- Maintain understanding of current Web technologies or programming practices through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Analyze user needs to determine technical requirements.
- Respond to user email inquiries, or set up automated systems to send responses.
- Renew domain name registrations.
- Confer with management or development teams to prioritize needs, resolve conflicts, develop content criteria, or choose solutions.
- Communicate with network personnel or Web site hosting agencies to address hardware or software issues affecting Web sites.
- Collaborate with management or users to develop e-commerce strategies and to integrate these strategies with Web sites.
- Document test plans, testing procedures, or test results.
- Establish appropriate server directory trees.
- Recommend and implement performance improvements.
- Document technical factors such as server load, bandwidth, database performance, and browser and device types.
- Develop or implement procedures for ongoing Web site revision.
- Create Web models or prototypes that include physical, interface, logical, or data models.
- Provide clear, detailed descriptions of Web site specifications, such as product features, activities, software, communication protocols, programming languages, and operating systems software and hardware.
- Evaluate or recommend server hardware or software.
- Monitor security system performance logs to identify problems and notify security specialists when problems occur.
- Install and configure hypertext transfer protocol (HTTP) servers and associated operating systems.
- Research, document, rate, or select alternatives for Web architecture or technologies.
- Develop system interaction or sequence diagrams.
- Incorporate technical considerations into Web site design plans, such as budgets, equipment, performance requirements, and legal issues including accessibility and privacy.
- Design and implement Web site security measures, such as firewalls and message encryption.