Required skills
analytical skills to:
analyse enterprise data security requirements and help-desk records
monitor and assess encryption systems
review a range of encryption software and tools
review security plan and conduct a detailed survey, including effect on user
review system security logs for breaches
communication skills to:
convey and clarify complex information
liaise with users and clients
literacy skills to:
create and interpret a data security analysis report
interpret an enterprise security plan
interpret and prepare technical documentation that includes encryption options and costs
numeracy skills to make estimates and comparison of costs (cost-benefit analysis)
planning and organisational skills to analyse effect on user and plan for organisational change
problem-solving skills to troubleshoot, debug and correct connectivity and security issues
research skills to:
assess and compare encryption options
determine data security threats, risks and countermeasures
technical skills to:
develop enterprise policy and procedures
implement best practice encryption systems
implement local area network (LAN) or wireless local area network (WLAN), virtual private network (VPN) or wide area network (WAN) solutions
monitor encryption system for issues and compromises
test and prove function of chosen encryption system
undertake a network security risk assessment.
Required knowledge
certificate-related infrastructure (certificate authorities, registration authorities, repository services)
common asymmetric key algorithms and their usage
common symmetric key algorithms and their usage, such as:
advanced encryption standard (AES)
data encryption standard (DES)
triple data encryption algorithm (triple DES)
Blowfish
encryption strength
encryption types (public key, secret key, hash key)
functions and features of:
access control permissions
digital signatures
symmetric encryption, asymmetric encryption and one-way encryption
timestamps
one-way message digests, such as message digest algorithm 5 (MD5) and secure hash algorithm (SHA)
public key infrastructure (PKI), pretty good privacy (PGP) and GNU Privacy Guard (GnuPG)
replay security
sources of security threats, including eavesdropping, data interception, data corruption, data falsification and authentication issues
transmission control protocol or internet protocol (TCP/IP) protocols and applications
security problems and challenges that arise from organisational issues
wired equivalent privacy (WEP), wi-fi protected access (WPA) and wi-fi protected access 2 (WPA2).