Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


Job description for an information security engineer. Full document

Occupational Safety and Health

Occupational Safety and Health / Job descriptions

Comments on the article Comments on the article

I. General Provisions

  1. This Job Description defines the functional duties, rights and responsibilities of the Information Security Engineer.
  2. An information security engineer is appointed and dismissed in accordance with the procedure established by the current labor legislation by order of the director of the enterprise.
  3. The Information Security Engineer reports directly to _______.
  4. A person who has a higher professional (technical) education without any requirements for work experience or a secondary professional (technical) education and at least 3 years of experience in the position of an information security technician of category I for at least 5 years or other positions filled by specialists is appointed to the position of Information Security Engineer with secondary vocational education, not less than XNUMX years.
  5. The information security engineer must know:
  • resolutions, orders, orders, methodological and regulatory materials on issues related to ensuring the technical protection of information;
  • specialization of the enterprise and features of its activity;
  • methods and means of obtaining, processing and transmitting information;
  • scientific, technical and other specialized literature on the technical support of information security;
  • technical means of information protection;
  • software and mathematical means of information protection;
  • the procedure for issuing technical documentation on information security;
  • channels of possible information leakage;
  • methods of analysis and protection of information;
  • organization of work on information protection;
  • instructions for compliance with the regime of special work;
  • domestic and foreign experience in the field of technical intelligence and information protection;
  • fundamentals of economics, organization of production, labor and management;
  • fundamentals of labor legislation;
  • rules and regulations of labor protection.
  1. During the period of temporary absence of the Information Security Engineer, his duties are assigned to _______.

II. Official duties

Information Security Engineer:

  1. Performs work on the design and implementation of special technical and software-mathematical means of information protection, providing organizational and engineering measures for the protection of information systems, conducts research in order to find and select the most appropriate practical solutions within the task.
  2. Carries out the selection, study and generalization of scientific and technical literature, regulatory and methodological materials on technical means and methods of information protection.
  3. Participates in the review of draft technical specifications, plans and schedules for the technical protection of information, in the development of the necessary technical documentation.
  4. Compiles calculation methods and programs for experimental research on the technical protection of information, performs calculations in accordance with the developed methods and programs.
  5. Conducts a comparative analysis of research and test data, studies possible sources and channels of information leakage.
  6. Carries out the development of technical support for the information security system, maintenance of information security tools, takes part in the preparation of recommendations and proposals for improving and increasing the efficiency of information security, in writing and designing sections of scientific and technical reports.
  7. Compiles information reviews on the technical protection of information. Performs operational tasks related to ensuring control of technical means and mechanisms of the information security system, participates in conducting inspections of institutions, organizations and enterprises to comply with the requirements of regulatory and technical documentation for information security, in preparing reviews and conclusions on regulatory and methodological materials and technical documentation.
  8. Prepares proposals for concluding agreements and contracts with other institutions, organizations and enterprises providing services in the field of technical means of information security, draws up applications for the necessary materials, equipment, devices.
  9. Participates in the certification of objects, premises, technical means, programs, algorithms for compliance with the requirements of information security for the relevant security classes.
  10. Conducts control checks of the operability and efficiency of existing systems and technical means of information protection, draws up and draws up acts of control checks, analyzes the results of checks and develops proposals for improving and increasing the effectiveness of measures taken.
  11. It studies and summarizes the experience of other institutions, organizations and enterprises on the use of technical means and methods of protecting information in order to increase efficiency and improve work on its protection and the preservation of state secrets.
  12. Performs work on time at a high scientific and technical level, observing the requirements of instructions on the mode of work.

III. Rights

The information security engineer has the right to:

  1. Get acquainted with the draft decisions of the management of the enterprise regarding its activities.
  2. Submit proposals for improvement of the work related to the responsibilities provided for in this instruction for consideration by the management.
  3. Within the limits of his competence, inform his immediate supervisor of all shortcomings in the activities of the enterprise (its structural divisions) identified in the course of the performance of official duties and make proposals for their elimination.
  4. To request personally or on behalf of his immediate supervisor from specialists of departments information and documents necessary for the performance of his duties.
  5. Involve specialists from all (individual) structural divisions in solving the tasks assigned to him (if this is provided for by the regulations on structural divisions, if not, then with the permission of their heads).
  6. Require from his immediate supervisor, the management of the enterprise to assist in the performance of his duties and rights.

IV. A responsibility

The information security engineer is responsible for:

  1. For improper performance or non-performance of their official duties provided for by this Job Description, within the limits determined by the labor legislation of Ukraine.
  2. For offenses committed in the course of carrying out their activities - within the limits determined by the administrative, criminal and civil legislation of Ukraine.
  3. For causing material damage - within the limits determined by the current legislation of Ukraine.

 We recommend interesting articles Section Job descriptions:

▪ Broadcast video engineer. Job description

▪ Bacteriologist. Job description

▪ Head of the rental department. Job description

See other articles Section Job descriptions.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

Machine for thinning flowers in gardens 02.05.2024

In modern agriculture, technological progress is developing aimed at increasing the efficiency of plant care processes. The innovative Florix flower thinning machine was presented in Italy, designed to optimize the harvesting stage. This tool is equipped with mobile arms, allowing it to be easily adapted to the needs of the garden. The operator can adjust the speed of the thin wires by controlling them from the tractor cab using a joystick. This approach significantly increases the efficiency of the flower thinning process, providing the possibility of individual adjustment to the specific conditions of the garden, as well as the variety and type of fruit grown in it. After testing the Florix machine for two years on various types of fruit, the results were very encouraging. Farmers such as Filiberto Montanari, who has used a Florix machine for several years, have reported a significant reduction in the time and labor required to thin flowers. ... >>

Advanced Infrared Microscope 02.05.2024

Microscopes play an important role in scientific research, allowing scientists to delve into structures and processes invisible to the eye. However, various microscopy methods have their limitations, and among them was the limitation of resolution when using the infrared range. But the latest achievements of Japanese researchers from the University of Tokyo open up new prospects for studying the microworld. Scientists from the University of Tokyo have unveiled a new microscope that will revolutionize the capabilities of infrared microscopy. This advanced instrument allows you to see the internal structures of living bacteria with amazing clarity on the nanometer scale. Typically, mid-infrared microscopes are limited by low resolution, but the latest development from Japanese researchers overcomes these limitations. According to scientists, the developed microscope allows creating images with a resolution of up to 120 nanometers, which is 30 times higher than the resolution of traditional microscopes. ... >>

Air trap for insects 01.05.2024

Agriculture is one of the key sectors of the economy, and pest control is an integral part of this process. A team of scientists from the Indian Council of Agricultural Research-Central Potato Research Institute (ICAR-CPRI), Shimla, has come up with an innovative solution to this problem - a wind-powered insect air trap. This device addresses the shortcomings of traditional pest control methods by providing real-time insect population data. The trap is powered entirely by wind energy, making it an environmentally friendly solution that requires no power. Its unique design allows monitoring of both harmful and beneficial insects, providing a complete overview of the population in any agricultural area. “By assessing target pests at the right time, we can take necessary measures to control both pests and diseases,” says Kapil ... >>

Random news from the Archive

Glasses with face recognition 07.02.2018

With the advent of facial recognition systems, discussions about privacy violations broke out in society. In Asia, they resumed after the Chinese police were equipped with glasses with a built-in video camera and a scanner for identification. The new equipment is being used by law enforcement officers who work on the Zhengzhou high-speed railway in Henan province.

With the help of a face-scanning system, the police have already managed to detain seven people who are associated with crime syndicates and are suspected of committing serious crimes, including murder and the slave trade. Also at the train stations were caught 26 people with fake identities.

The glasses were developed by Beijing-based LLVision Technology Co. The creators of the device said that the glasses are able to identify a criminal in 100 milliseconds. There is, of course, the possibility of error, but in general, the glasses work quite accurately. Interestingly, the database of criminals' faces is not stored in the "cloud" service of the police, but on the office smartphone of each police officer. Attackers will not be able to gain access to it and hack.

If the system detects a suspect in the crowd, it will inform the policeman about this, and he will be able to promptly arrest him. However, the Chinese public fears that these systems can be used by the authorities not only for help, but also for harm, violating privacy and human rights. For example, some Chinese believe that the US intelligence agencies can connect to police glasses and literally monitor all of China.

Meanwhile, these fears are not groundless. China is in fact working on the world's largest country-wide surveillance network. 170 million CCTV cameras have already been put into operation, and another 400 million devices will enter service over the next three years. Many of them have some semblance of artificial intelligence, including face recognition.

Other interesting news:

▪ Microelectrodes help to find out the word made by a person

▪ Music tunes the child's brain for speech

▪ Transimpedance operational amplifiers up to 2,1 GHz

▪ How to catch a rainbow

▪ transparent concrete

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ section of the site Firmware. Article selection

▪ article by Armand Jean du Plessis Richelieu (Cardinal Richelieu). Famous aphorisms

▪ article Who won the match when Federer played the grass half and Nadal the clay half? Detailed answer

▪ Quincke's edema article. Health care

▪ article The PIC controller controls the electric motor. Encyclopedia of radio electronics and electrical engineering

▪ article Porcelain vase. Focus Secret

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024