Latest release
Minor Group

271 Cyber Security Professionals and Database and Systems Administrators

OSCA - Occupation Standard Classification for Australia
Reference period
2024, Version 1.0

271 Cyber Security Professionals and Database and Systems Administrators

Design, develop, install, test and maintain cyber security and database standards, guidelines, software and systems.

OSCA skill level

The occupations in this minor group have a skill level corresponding to the qualifications and experience below.

  • Skill Level 1: Bachelor Degree, higher qualification, or at least five years of relevant experience
Unit Group

2711 Cyber Security Professionals

Develop and implement cyber security standards and guidelines, develop and install cyber security software and systems, conduct risk and security control assessments, analyse and address vulnerabilities in digital infrastructure, and respond to cyber security incidents.

OSCA skill level

The occupations in this unit group have a skill level corresponding to the qualifications and experience below.

  • Skill Level 1: Bachelor Degree, higher qualification, or at least five years of relevant experience
Occupation

271131 Cyber Governance Risk and Compliance Specialist

Leads the governance, risk and compliance for cyber security.

Skill level: 1

Main tasks

  • Develops, implements and measures cyber security policies, procedures and guidelines to comply with regulatory requirements and industry best practices
  • Manages a risk management program, including risk assessments, risk mitigation plans and risk reporting
  • Conducts regular security audits to identify potential security gaps and areas for improvement
  • Provides guidance and training to employees on cyber security awareness, best practices and incident response procedures
  • Develops and defines system classification requirements to ensure implementation of security controls and risk mitigation efforts are prioritised
  • Conducts compliance assessments to ensure that regulatory and legal requirements related to cyber security are being met
Occupation

271132 Cyber Security Advice and Assessment Specialist

Conducts risk and security control assessments, interprets security policies, contributes to the development of standards and guidelines, reviews information system designs, provides guidance on security strategies to manage identified risks, provides specialist advice and explains systems security, strengths and weaknesses.

Alternative titles

  • Cyber Security Adviser
  • Cyber Security Consultant
  • ICT Security Adviser
  • ICT Security Consultant

Skill level: 1

Main tasks

  • Conducts risk and security control assessments and vulnerability testing to identify potential security risks and weaknesses in an organisation's cyber security policies
  • Provides specialist advice and guidance on security strategies to manage identified risks and vulnerabilities
  • Develops and implements security policies, procedures, and standards and guidelines to help organisations maintain a strong security position
  • Undertakes investigations and reports on security incidents, and guides the refinement of practices and processes that increase the detection of security related incidents
  • Assists in root cause analysis of security incidents and breaches to determine the extent of the damage, and recommend remedial actions
  • Develops metrics to highlight the impact of cyber security risks on business processes and information assets
  • Aligns and coordinates internal and external audit activities and security assessment engagements
Occupation

271133 Cyber Security Analyst

Analyses and assesses vulnerability in infrastructure (software, hardware and networks), investigates available tools and countermeasures to remedy detected vulnerabilities, and recommends solutions and best practices. Analyses and assesses damage to data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions.

Alternative titles

  • ICT Security Analyst
  • Information Security Analyst

Specialisations

  • Cyber Security Researcher or Vulnerability Researcher
  • Cyber Security Vulnerability Assessor
  • Cyber Threat Analyst
  • Malware Analyst

Skill level: 1

Main tasks

  • Performs assessments on systems, networks and applications to identify and prioritise potential security risks
  • Coordinates, analyses and investigates security risk incidents and breaches to determine the root cause, and develops mitigation controls and strategies
  • Conducts research on cyber threats and weaknesses to develop and maintain knowledge of the cyber threat landscape
  • Develops and executes threat intelligence strategies for future threats and protects against potential attacks
  • Conducts risk assessments to identify security loopholes and weaknesses in IT systems
  • Conducts malware analysis to identify and mitigate potential threats to systems and networks
  • Analyses alerts and data from security products, web proxies, network security devices, and vulnerable scan and management systems
Occupation

271134 Cyber Security Architect

Designs a security system or major components of a security system, and may head a security design team building a new security system.

Alternative titles

  • Enterprise Security Architect
  • ICT Security Architect

Skill level: 1

Main tasks

  • Develops and implements cyber security strategy and architecture
  • Designs and maintains security controls and processes to protect systems, networks and data
  • Reviews system security measures, and recommends and implements enhancements
  • Collaborates with other ICT and business departments to align security measures with security standards, policies and regulations
  • Stays updated on cyber security threats, and recommends new security technology and strategy improvements
  • Implements new cyber security solutions and technologies
  • Provides guidance to ICT staff on security best practices
  • Develops and maintains cyber security reference architecture for consistent security controls
  • Implements incident response and disaster recovery plans
Occupation

271135 Cyber Security Engineer

Designs, develops, modifies, documents, tests, implements, installs and supports cyber security software applications and systems to ensure they are fully integrated.

Alternative titles

  • ICT Security Engineer
  • Information Security Engineer

Skill level: 1

Main tasks

  • Develops, implements and integrates secure coding practices, and conducts security testing and vulnerability assessments for software and systems
  • Collaborates with developers to identify and remediate security issues
  • Develops and implements secure software development lifecycle processes and methodologies
  • Integrates security controls into development processes
  • Participates in code reviews and provides security guidance
  • Assesses security of third-party software components and libraries used in software and applications
  • Develops and implements secure application programming interfaces and libraries for use in software and applications
  • Performs code analysis scan on software binaries
Occupation

271136 Cyber Security Operations Coordinator

Leads the coordination and response to complex cyber security incidents and hunt investigations, manages tasks across various teams for incident response and hunt operations, advises leadership on current operational collaborations, contributes toward strategic planning, facilitates incident response engagements, and assesses technical information to develop key messaging.

Alternative titles

  • Cyber Security Operations Manager
  • ICT Security Administrator

Specialisation

  • Cyber Security Incident Responder

Skill level: 1

Main tasks

  • Leads the investigation and response to cyber security incidents and hunts, including containment, mitigation and recovery activities
  • Analyses security risks and vulnerabilities, and implements security plans
  • Performs threat management and modelling to identify threat vectors and develop cases for security modelling
  • Coordinates with other teams to maintain the security of systems and information
  • Assists in security awareness training for staff
  • Manages the collection, preservation and analysis of forensic evidence
  • Implements technical controls that align with security strategies and security architecture
Occupation

271137 Penetration Tester

Creates test cases using in-depth technical analysis of risks and typical vulnerabilities, and produces test scripts, materials and packs to test new and existing software or services. Plans, coordinates and conducts cyber threat emulation activities in support of certification, accreditation and operational priorities to verify deficiencies in technical security controls.

Alternative title

  • Ethical Hacker

Skill level: 1

Main tasks

  • Develops and executes penetration testing methodologies and strategies to identify weaknesses in security controls
  • Creates test cases using in-depth technical analysis of risks and typical vulnerabilities
  • Produces test scripts, materials and packs to test new and existing software or services for vulnerabilities
  • Plans, coordinates and conducts cyber threat emulation activities to verify deficiencies in technical security controls, and provides recommendations for remediation
  • Identifies vulnerability exploitations and potential attack vectors into a system, and analyses vulnerability scan results to assess security loopholes and threats
  • May conduct phishing attacks or other tests to evaluate the effectiveness of security awareness training
Unit Group

2712 Database and Systems Administrators

Design, develop, install and maintain operating systems, software and server hardware to support secure and reliable database management systems.

OSCA skill level

The occupations in this unit group have a skill level corresponding to the qualifications and experience below.

  • Skill Level 1: Bachelor Degree, higher qualification, or at least five years of relevant experience
Occupation

271231 Database Administrator

Plans, designs, configures, maintains and supports an organisation's database management system in accordance with user requirements, ensuring optimal database integrity, security, backup, reliability and performance.

Database developers are excluded from this occupation. Database developers are included in Occupation 273333 Software Engineer.

Alternative titles

  • DBA
  • ICT Database Manager

Specialisation

  • ICT Database Analyst

Skill level: 1

Main tasks

  • Designs and implements database structures to optimise system performance and data storage efficiency
  • Monitors and optimises database performance using various techniques such as indexing and fine-tuning queries
  • Implements and maintains security protocols to protect databases from unauthorised access or breaches
  • Performs regular data backups and recovery tasks to ensure data integrity and availability
  • Coordinates database updates and migrations, including database software installation, configuration and patch management
  • Develops disaster recovery plans to protect data from any potential loss or corruption
Occupation

271232 Systems Administrator

Plans, develops, installs, troubleshoots, maintains and supports an operating system and associated server hardware, software and databases, ensuring optimum system integrity, security, backup and performance.

Alternative title

  • ICT Systems Manager

Skill level: 1

Main tasks

  • Installs, configures and maintains server hardware, software, operating systems and databases infrastructure
  • Diagnoses and resolves hardware, software and network connectivity issues to ensure uninterrupted system operation
  • Conducts regular system backups and recovery procedures, ensuring data safety and integrity
  • Facilitates IT infrastructure changes through change management processes, in accordance with organisational protocols
  • Provides system related technical support and guidance to end users
  • Manages user accounts, permissions and security policies to ensure data security and compliance with regulations