analyse network bandwidth requirements
analyse network configuration and performance
cyber security
define firewall rules
ensure information security
execute administration
ICT communications protocols
ICT networking hardware
ICT network security risks
implement a firewall
information security strategy
maintain database security
manage ICT virtualisation environments