Required skills
communication skills to liaise with internal and external personnel on security-related matters
literacy skills to:
interpret technical documentation
write reports in required formats
read and interpret enterprise security procedures, policies and specifications
review vendor sites, bulletins and notifications for security information
planning and organisational skills to:
plan control methods for network service security and authentication
plan, prioritise and monitor own work
problem-solving and contingency-management skills to:
adapt configuration procedures to requirements of network service security and reconfigure depending on differing operational contingencies, risk situations and environments
detect, investigate and recover from security breaches
safety-awareness skills to:
apply precautions and required action to minimise, control or eliminate hazards that may exist during work activities
follow enterprise OHS procedures
work systematically with required attention to detail without injury to self or others, or damage to goods or equipment
research skills to interrogate vendor databases and websites to implement different configuration requirements to meet security levels
technical skills to:
design network service and authentication security
identify the technical requirements, constraints and manageability issues for given customer server-security requirements
implement security strategies
install network service and authentication security design
monitor log files for security information
select and use server and network diagnostics
test server security.
Required knowledge
auditing and penetration testing techniques
best practice procedures for implementing backup and restore
cryptographic techniques
procedures for error and event logging and reporting
intrusion detection and recovery procedures
network service configuration, including DNS, DHCP, web, mail, FTP, SMB, NTP and proxy
network service security features, options and limitations
network service vulnerabilities
operating system help and support utilities
planning, configuration, monitoring and troubleshooting techniques
security protection mechanisms
security threats and risks
server firewall configuration
server monitoring and troubleshooting tools and techniques, including network monitoring and diagnostic utilities
user authentication and directory services.