1 |
Has technical knowledge of network infrastructures, security devices and system configurations and can install and manage these infrastructures securely. |
2 |
Can detect and report vulnerabilities in information systems by applying penetration tests, vulnerability analysis and penetration tests. |
3 |
Can perform threat hunting, log analysis and post-incident forensic investigations in cyber incident response processes. |
4 |
Can install, configure and effectively use firewall, IDS/IPS, antivirus and security information and event management (SIEM) systems. |
5 |
Can use information security components such as cryptology, authentication and access control mechanisms at a practical level. |
6 |
Establish and maintain security policies in accordance with national and international information security standards (ISO/IEC 27001, NIST, etc.). |