Skip to main content

252912 - Information technology security specialist

Performs security vulnerability assessments and penetration testing according to company-acceptable methods and protocols. Analyzes system vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational deficiencies.


Main activities

• examines the external and internal environment of the organization, determines its advantages and disadvantages, is based on corporate strategies and further planning;
• performs security, network penetration, wireless testing, code reviews, wireless and firewall types of assessments in accordance with industry-accepted methods and protocols, identifies and analyzes vulnerabilities; 
• develops and tests software usage methods in a controlled environment, identifies and checks system bugs or vulnerabilities; 
• evaluates system reliability and performance before, during and after component inclusion and during system operation and maintenance, selects and uses performance monitoring tools and methods, special software; 
• analyzes system and network structure, hardware and software components and data, identifies weaknesses and vulnerabilities related to hacks or attacks. Performs cyber infrastructure diagnostic procedures, including the identification, interpretation and categorization of vulnerabilities, associated attacks and malicious code.

Characteristic competences

• analyze the organization's information and communication technology environment;
• perform security testing of information and communication technologies;
• develop ways of exploiting code gaps;
• monitor the work of the systems;
• identify the weak points of information and communication technology systems.

Versija: 2023
Pagrindinės grupės kodas: 2
Sub-major groups code: 25
Minor group code: 252
Unit group code: 2529