- Identify, standardize, and communicate levels of access and security.
Occupations with related tasks Save Table: XLSX CSV
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Conduct network and security system audits, using established criteria.
- Configure information systems to incorporate principles of least functionality and least access.
- Develop presentations on threat intelligence.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Identify security system weaknesses, using penetration tests.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
- Develop and write procedures for installation, use, or troubleshooting of communications hardware or software.
- Develop or maintain project reporting systems.
- Develop disaster recovery plans.
- Develop and implement solutions for network problems.
- Maintain networks by performing activities such as file addition, deletion, or backup.
- Coordinate network operations, maintenance, repairs, or upgrades.
- Coordinate installation of new equipment.
- Monitor and analyze network performance and reports on data input or output to detect problems, identify inefficient use of computer resources, or perform capacity planning.
- Develop network-related documentation.
- Participate in network technology upgrade or expansion projects, including installation of hardware and software and integration testing.
- Design, build, or operate equipment configuration prototypes, including network hardware, software, servers, or server operation systems.
- Adjust network sizes to meet volume or capacity demands.
- Communicate with system users to ensure accounts are set up properly or to diagnose and solve operational problems.
- Develop conceptual, logical, or physical network designs.
- Evaluate network designs to determine whether customer requirements are met efficiently and effectively.
- Communicate with vendors to gather information about products, alert them to future needs, resolve problems, or address system maintenance issues.
- Develop plans or budgets for network equipment replacement.
- Communicate with customers, sales staff, or marketing staff to determine customer needs.
- Determine specific network hardware or software requirements, such as platforms, interfaces, bandwidths, or routine schemas.
- Prepare detailed network specifications, including diagrams, charts, equipment configurations, or recommended technologies.
- Supervise engineers or other staff in the design or implementation of network solutions.
- Research and test new or modified hardware or software products to determine performance and interoperability.
- Estimate time and materials needed to complete projects.
- Design, organize, and deliver product awareness, skills transfer, or product education sessions for staff or suppliers.
- Explain design specifications to integration or test engineers.
- Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.
- Coordinate network or design activities with designers of associated networks.
- Prepare or monitor project schedules, budgets, or cost control systems.
- Prepare design presentations and proposals for staff or customers.
- Use network computer-aided design (CAD) software packages to optimize network designs.
- Visit vendors, attend conferences or training sessions, or study technical journals to keep up with changes in technology.
- Maintain or coordinate the maintenance of network peripherals, such as printers.
- Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
- Develop and write procedures for installation, use, or troubleshooting of communications hardware or software.
- Develop or maintain project reporting systems.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Assess blockchain threats, such as untested code and unprotected keys.
- Automate the deployment of software updates over geographically distributed network nodes.
- Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
- Design and develop blockchain technologies for industries such as finance and music.
- Design and implement dashboard and data visualizations to meet customer reporting needs.
- Design and implement data repositories to integrate data.
- Develop a maintainable code base using object-oriented design principles, practices, or patterns.
- Discuss and plan systems with solution architects, system engineers, or cybersecurity experts to meet customer requirements.
- Discuss data needs with engineers, product managers, or data scientists to identify blockchain requirements.
- Evaluate blockchain processes or risks based on security assessments or control matrix reviews.
- Evaluate new blockchain technologies and vendor products.
- Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
- Run infrastructure tests to examine the behavior of large peer-to-peer networks.
- Test the security and performance of blockchain infrastructures.
- Update client and server applications responsible for integration and business logic.
- Design and verify cryptographic protocols to protect private information.
- Determine specifications for, or implement, logging.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Translate nursing practice information between nurses and systems engineers, analysts, or designers, using object-oriented models or other techniques.
- Use informatics science to design or implement health information technology applications for resolution of clinical or health care administrative problems.
- Analyze and interpret patient, nursing, or information systems data to improve nursing services.
- Identify, collect, record, or analyze data relevant to the nursing care of patients.
- Apply knowledge of computer science, information science, nursing, and informatics theory to nursing practice, education, administration, or research, in collaboration with other health informatics specialists.
- Develop, implement, or evaluate health information technology applications, tools, processes, or structures to assist nurses with data management.
- Design, develop, select, test, implement, and evaluate new or modified informatics solutions, data structures, and decision-support mechanisms to support patients, health care professionals, and their information management and human-computer and human-technology interactions within health care contexts.
- Disseminate information about nursing informatics science and practice to the profession, other health care professions, nursing students, and the public.
- Analyze computer and information technologies to determine applicability to nursing practice, education, administration, and research.
- Read current literature, talk with colleagues, and participate in professional organizations or conferences to keep abreast of developments in informatics.
- Develop or deliver training programs for health information technology, creating operating manuals as needed.
- Design, conduct, or provide support to nursing informatics research.
- Inform local, state, national, and international health policies related to information management and communication, confidentiality and security, patient safety, infrastructure development, and economics.
- Provide consultation to nurses regarding hardware or software configuration.
- Plan, install, repair, or troubleshoot telehealth technology applications or systems in homes.
- Develop or implement policies or practices to ensure the privacy, confidentiality, or security of patient information.
- Develop strategies, policies or procedures for introducing, evaluating, or modifying information technology applied to nursing practice, administration, education, or research.
- Assist in the development of online transaction or security policies.
- Identify methods for interfacing Web application technologies with enterprise resource planning or other system software.
- Manage tracking and reporting of search-related activities and provide analyses to marketing executives.
- Optimize digital assets, such as text, graphics, or multimedia assets, for search engine optimization (SEO) or for display and usability on internet-connected devices.
- Collect and analyze Web metrics, such as visits, time on site, page views per visit, transaction volume and revenue, traffic mix, click-through rates, conversion rates, cost per acquisition, or cost per click.
- Participate in the development or implementation of online marketing strategy.
- Optimize Web site exposure by analyzing search engine patterns to direct online placement of keywords or other content.
- Coordinate with developers to optimize Web site architecture, server configuration, or page construction for search engine consumption and optimal visibility.
- Assist in setting up or optimizing analytics tools for tracking visitors' behaviors.
- Identify appropriate Key Performance Indicators (KPIs) and report key metrics from digital campaigns.
- Create content strategies for digital media.
- Combine secondary data sources with keyword research to more accurately profile and satisfy user intent.
- Collaborate with other marketing staff to integrate and complement marketing strategies across multiple sales channels.
- Optimize shopping cart experience or Web site conversion rates against Key Performance Indicators (KPIs).
- Improve search-related activities through ongoing analysis, experimentation, or optimization tests, using A/B or multivariate methods.
- Conduct online marketing initiatives, such as paid ad placement, affiliate programs, sponsorship programs, email promotions, or viral marketing campaigns on social media Web sites.
- Conduct market research analysis to identify search query trends, real-time search and news media activity, popular social media topics, electronic commerce trends, market opportunities, or competitor performance.
- Propose online or multiple-sales-channel campaigns to marketing executives.
- Evaluate new emerging media or technologies and make recommendations for their application within Internet marketing or search marketing campaigns.
- Communicate and collaborate with merchants, Webmasters, bloggers, or online editors to strategically place hyperlinks.
- Identify, evaluate, or procure hardware or software for implementing online marketing campaigns.
- Collaborate with Web, multimedia, or art design staffs to create multimedia Web sites or other internet content that conforms to brand and company visual format.
- Keep abreast of government regulations and emerging Web technology to ensure regulatory compliance by reviewing current literature, talking with colleagues, participating in educational programs, attending meetings or workshops, or participating in professional organizations or conferences.
- Purchase or negotiate placement of listings in local search engines, directories, or digital mapping technologies.
- Coordinate sales or other promotional strategies with merchandising, operations, or inventory control staff to ensure product catalogs are current, accurate, and organized for best findability against user intent.
- Execute or manage social media campaigns to inform search marketing tactics.
- Conduct financial modeling for online marketing programs or Web site revenue forecasting.
- Implement online customer service processes to ensure positive and consistent user experiences.
- Develop transactional Web applications, using Web programming software and knowledge of programming languages, such as hypertext markup language (HTML) and extensible markup language (XML).
- Identify and develop commercial or technical specifications, such as usability, pricing, checkout, or data security, to promote transactional internet-enabled commerce functionality.
- Define product requirements, based on market research analysis, in collaboration with user interface design and engineering staff.
- Execute or manage banner, video, or other non-text link ad campaigns.
- Assist in the evaluation or negotiation of contracts with vendors or online partners.
- Prepare electronic commerce designs or prototypes, such as storyboards, mock-ups, or other content, using graphics design software.
- Execute and manage communications with digital journalists or bloggers.
- Resolve product availability problems in collaboration with customer service staff.
- Assist in the development of online transaction or security policies.
- Identify methods for interfacing Web application technologies with enterprise resource planning or other system software.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Document computer security and emergency measures policies, procedures, and tests.
- Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
- Monitor use of data files and regulate access to safeguard information in computer files.
- Coordinate implementation of computer system plan with establishment personnel and outside vendors.
- Train users and promote security awareness to ensure system security and to improve server and network efficiency.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Address the relationships of quantities, magnitudes, and forms through the use of numbers and symbols.
- Disseminate research by writing reports, publishing papers, or presenting at professional conferences.
- Maintain knowledge in the field by reading professional journals, talking with other mathematicians, and attending professional conferences.
- Apply mathematical theories and techniques to the solution of practical problems in business, engineering, the sciences, or other fields.
- Conduct research to extend mathematical knowledge in traditional areas, such as algebra, geometry, probability, and logic.
- Develop mathematical or statistical models of phenomena to be used for analysis or for computational simulation.
- Perform computations and apply methods of numerical analysis to data.
- Assemble sets of assumptions, and explore the consequences of each set.
- Develop new principles and new relationships between existing mathematical principles to advance mathematical science.
- Develop computational methods for solving problems that occur in areas of science and engineering or that come from applications in business or industry.
- Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Modify existing databases and database management systems or direct programmers and analysts to make changes.
- Plan and install upgrades of database management system software to enhance database performance.
- Specify users and user access levels for each segment of database.
- Test changes to database applications or systems.
- Test programs or databases, correct errors, and make necessary modifications.
- Train users and answer questions.
- Provide technical support to junior staff or clients.
- Approve, schedule, plan, and supervise the installation and testing of new products and improvements to computer systems, such as the installation of new databases.
- Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
- Write and code logical and physical database descriptions and specify identifiers of database to management system, or direct others in coding descriptions.
- Develop data models describing data elements and how they are used, following procedures and using pen, template, or computer software.
- Select and enter codes to monitor database performance and to create production databases.
- Identify, evaluate and recommend hardware or software technologies to achieve desired database performance.
- Review procedures in database management system manuals to make changes to database.
- Identify and evaluate industry trends in database systems to serve as a source of information and advice for upper management.
- Review workflow charts developed by programmer analyst to understand tasks computer will perform, such as updating records.
- Revise company definition of data as defined in data dictionary.
- Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
- Perform data backups and disaster recovery operations.
- Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
- Configure, monitor, and maintain email applications or virus protection software.
- Operate master consoles to monitor the performance of computer systems and networks and to coordinate computer network access and use.
- Monitor network performance to determine whether adjustments are needed and where changes will be needed in the future.
- Analyze equipment performance records to determine the need for repair or replacement.
- Confer with network users about solutions to existing system problems.
- Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
- Design, configure, and test computer hardware, networking software and operating system software.
- Perform routine network startup and shutdown procedures, and maintain control records.
- Load computer tapes and disks, and install software and printer paper or forms.
- Train people in computer system use.
- Maintain logs related to network functions, as well as maintenance and repair records.
- Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
- Coordinate with vendors and with company personnel to facilitate purchases.
- Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system.
- Maintain an inventory of parts for emergency repairs.
- Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Design and implement Web site security measures, such as firewalls and message encryption.
- Write supporting code for Web applications or Web sites.
- Design, build, or maintain Web sites, using authoring or scripting languages, content creation tools, management tools, and digital media.
- Back up files from Web sites to local directories for instant recovery in case of problems.
- Select programming languages, design tools, or applications.
- Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.
- Develop databases that support Web applications and Web sites.
- Perform Web site tests according to planned schedules, or after any Web site or product revision.
- Perform or direct Web site updates.
- Maintain understanding of current Web technologies or programming practices through continuing education, reading, or participation in professional conferences, workshops, or groups.
- Analyze user needs to determine technical requirements.
- Respond to user email inquiries, or set up automated systems to send responses.
- Renew domain name registrations.
- Confer with management or development teams to prioritize needs, resolve conflicts, develop content criteria, or choose solutions.
- Communicate with network personnel or Web site hosting agencies to address hardware or software issues affecting Web sites.
- Collaborate with management or users to develop e-commerce strategies and to integrate these strategies with Web sites.
- Document test plans, testing procedures, or test results.
- Establish appropriate server directory trees.
- Recommend and implement performance improvements.
- Document technical factors such as server load, bandwidth, database performance, and browser and device types.
- Develop or implement procedures for ongoing Web site revision.
- Create Web models or prototypes that include physical, interface, logical, or data models.
- Provide clear, detailed descriptions of Web site specifications, such as product features, activities, software, communication protocols, programming languages, and operating systems software and hardware.
- Evaluate or recommend server hardware or software.
- Monitor security system performance logs to identify problems and notify security specialists when problems occur.
- Install and configure hypertext transfer protocol (HTTP) servers and associated operating systems.
- Research, document, rate, or select alternatives for Web architecture or technologies.
- Develop system interaction or sequence diagrams.
- Incorporate technical considerations into Web site design plans, such as budgets, equipment, performance requirements, and legal issues including accessibility and privacy.
- Design and implement Web site security measures, such as firewalls and message encryption.