Skip to content

This badge was issued to Catherine Kjørsvik on October 13, 2022

SC-100: Microsoft Cybersecurity Architect badge image. Issued by Microsoft

Occupations

Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Digital Forensics Specialists

Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.

Cyber Security Consultants

Ensure online systems and networks are sufficiently protected from threats. Assist with strategic planning, assessment, and operational execution of all cyber security strategies, policies, and procedures. Establish and maintain a comprehensive information security program to ensure that all information assets are adequately protected against current and future internal and external threats.

Information Security Managers

Protect an organization's information assets against computer viruses, security breaches, fraud, and malicious hacker attacks. Plan and implement policies designed to protect an organisation's information assets. Manage and direct personnel responsible for protecting information security.

Penetration Testers

Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.