{"id":7546,"date":"2022-06-28T15:47:52","date_gmt":"2022-06-28T13:47:52","guid":{"rendered":"https:\/\/isga.ma\/isga\/?p=7546"},"modified":"2022-07-18T11:52:08","modified_gmt":"2022-07-18T09:52:08","slug":"fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation","status":"publish","type":"post","link":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/","title":{"rendered":"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; fullwidth=\u00a0\u00bbon\u00a0\u00bb module_class=\u00a0\u00bbde-inner-page-header\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; background_color=\u00a0\u00bbrgba(6,22,47,0.6)\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/isga.ma\/isga\/wp-content\/uploads\/2022\/06\/architechure-scaled.jpg\u00a0\u00bb parallax=\u00a0\u00bbon\u00a0\u00bb][et_pb_fullwidth_post_title meta=\u00a0\u00bboff\u00a0\u00bb featured_image=\u00a0\u00bboff\u00a0\u00bb text_color=\u00a0\u00bblight\u00a0\u00bb admin_label=\u00a0\u00bbPage Title\u00a0\u00bb _builder_version=\u00a0\u00bb4.4.1&Prime; title_font=\u00a0\u00bb|300|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb60px\u00a0\u00bb parallax=\u00a0\u00bbon\u00a0\u00bb parallax_method=\u00a0\u00bboff\u00a0\u00bb title_font_size_tablet=\u00a0\u00bb50px\u00a0\u00bb title_font_size_phone=\u00a0\u00bb40px\u00a0\u00bb title_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb parallax_effect=\u00a0\u00bbon\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbsection\u00a0\u00bb module_id=\u00a0\u00bbcourse-overview\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; background_enable_color=\u00a0\u00bboff\u00a0\u00bb custom_css_main_element=\u00a0\u00bb box-shadow: 0px 0px 30px rgba(0, 0, 0, 0.2);\u00a0\u00bb transparent_background=\u00a0\u00bboff\u00a0\u00bb make_fullwidth=\u00a0\u00bboff\u00a0\u00bb use_custom_width=\u00a0\u00bboff\u00a0\u00bb width_unit=\u00a0\u00bbon\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text admin_label=\u00a0\u00bbTitre 1&Prime; module_class=\u00a0\u00bbde-special-heading\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; header_2_font=\u00a0\u00bb|600||on|||||\u00a0\u00bb header_2_font_size=\u00a0\u00bb50px\u00a0\u00bb header_2_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb header_3_font=\u00a0\u00bb|300||on|||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#000000&Prime; header_3_font_size=\u00a0\u00bb40px\u00a0\u00bb header_3_letter_spacing=\u00a0\u00bb1px\u00a0\u00bb background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb40px\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb30px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb header_3_font_size_tablet=\u00a0\u00bb30px\u00a0\u00bb header_3_font_size_phone=\u00a0\u00bb20px\u00a0\u00bb header_3_font_size_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb]<\/p>\n<h1 style=\"text-align: left;\">Connaissez-vous ces missions principales  ? Les qualit\u00e9s requises pour exercer ce m\u00e9tier ? Ainsi que les tendances et facteurs d&rsquo;\u00e9volution du m\u00e9tier ?<\/h1>\n<h2 style=\"text-align: left;\">On vous dit tout dans cette fiche m\u00e9tier !<\/h2>\n<p>[\/et_pb_text][et_pb_blurb icon_placement=\u00a0\u00bbleft\u00a0\u00bb admin_label=\u00a0\u00bbOverview Content 1&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; header_font=\u00a0\u00bbRaleway|700|||||||\u00a0\u00bb header_text_align=\u00a0\u00bbleft\u00a0\u00bb header_text_color=\u00a0\u00bb#1c9576&Prime; header_font_size=\u00a0\u00bb21px\u00a0\u00bb body_font=\u00a0\u00bbSource Sans Pro||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbleft\u00a0\u00bb body_text_color=\u00a0\u00bb#555556&Prime; body_font_size=\u00a0\u00bb18.75px\u00a0\u00bb background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|10%|||false|false\u00a0\u00bb custom_css_blurb_content=\u00a0\u00bb max-width: 100%;\u00a0\u00bb use_border_color=\u00a0\u00bboff\u00a0\u00bb border_color=\u00a0\u00bb#ffffff\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb]\u00c9galement nomm\u00e9 ing\u00e9nieur de la s\u00e9curit\u00e9 informatique, il \u00e9labore la politique de protection de l\u2019environnement informatique et technologique d\u2019une entreprise. Il con\u00e7oit une architecture pour prot\u00e9ger les syst\u00e8mes d\u2019information, en interne comme en externe (sites web, messageries, intranet, paiement en ligne, identification, droits d\u2019acc\u00e8s\u2026). Il d\u00e9finit, teste et r\u00e9ajuste les proc\u00e9dures. Un r\u00f4le majeur \u00e0 l\u2019heure des virus et des risques de hacking. [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb3_5,2_5&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_5&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbPr\u00e9sentation et missions principales de l\u2019ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des SI\u00a0\u00bb icon_placement=\u00a0\u00bbleft\u00a0\u00bb admin_label=\u00a0\u00bbOverview Content 1&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; header_font=\u00a0\u00bbRaleway|700|||||||\u00a0\u00bb header_text_align=\u00a0\u00bbleft\u00a0\u00bb header_text_color=\u00a0\u00bb#1c9576&Prime; header_font_size=\u00a0\u00bb21px\u00a0\u00bb body_font=\u00a0\u00bbSource Sans Pro||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbleft\u00a0\u00bb body_text_color=\u00a0\u00bb#555556&Prime; body_font_size=\u00a0\u00bb18.75px\u00a0\u00bb background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|10%|||false|false\u00a0\u00bb custom_css_blurb_content=\u00a0\u00bb max-width: 100%;\u00a0\u00bb use_border_color=\u00a0\u00bboff\u00a0\u00bb border_color=\u00a0\u00bb#ffffff\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb]Son quotidien est anim\u00e9 par la recherche d\u2019une protection maximale. Pour r\u00e9ussir, l\u2019ing\u00e9nieur s\u00e9curit\u00e9 g\u00e8re l\u2019administration des outils et des bases de donn\u00e9es. Il d\u00e9finit le r\u00f4le de chaque utilisateur sur les \u00e9quipements et leur p\u00e9rim\u00e8tre d\u2019action. Il veille \u00e0 l\u2019accessibilit\u00e9 des syst\u00e8mes, la bonne transmission du flux d\u2019information tout en les prot\u00e9geant. Il doit concevoir une politique de s\u00e9curit\u00e9 des SI et la d\u00e9cliner en proc\u00e9dures efficaces (mots de passe, authentification, cryptographie, antivirus, certificats\u2026).<br \/>\nIl pilote une \u00e9quipe de techniciens informatiques qui met en place les param\u00e9trages pr\u00e9d\u00e9finis. Il organise des tests et des contr\u00f4les r\u00e9guliers. Il pr\u00e9voit des alertes en cas d\u2019intrusion ou de dysfonctionnement suspect. L\u2019ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des SI am\u00e9liore sans cesse son syst\u00e8me de s\u00e9curit\u00e9. Il g\u00e8re les relations avec les prestataires en lien avec l\u2019activit\u00e9 de protection.<br \/>\nIl peut \u00eatre embauch\u00e9 par une entreprise, par un cabinet d\u2019audit en informatique ou par une SSII.<br \/>\nIl r\u00e9alise des audits r\u00e9guliers pour d\u00e9celer les risques nouveaux, rechercher les failles et les axes d\u2019am\u00e9lioration. Il \u00e9tablit des rapports \u00e0 la suite des incidents pour analyser les causes et consolider la protection. Il r\u00e9dige des communications autour de ces sujets pour la direction des SI et\/ou les utilisateurs. Il r\u00e9pare les dommages caus\u00e9s apr\u00e8s une intrusion ou une attaque virale, en donnant un plan d\u2019action \u00e0 ses \u00e9quipes.<br \/>\nL\u2019ing\u00e9nieur s\u00e9curit\u00e9 reste en veille sur la cybers\u00e9curit\u00e9. Il suit aussi toutes les \u00e9volutions juridiques sur le sujet et garantit que les mesures de protection soient en phase avec la l\u00e9gislation.  [\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_5&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_image title_text=\u00a0\u00bbTraders analyzing data on exchange\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_image src=\u00a0\u00bbhttps:\/\/isga.ma\/isga\/wp-content\/uploads\/2022\/06\/indus-1-scaled.jpeg\u00a0\u00bb title_text=\u00a0\u00bbTraders analyzing data on exchange\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][\/et_pb_image][et_pb_image title_text=\u00a0\u00bbFuturistic smart city with 5G global network technology\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_image src=\u00a0\u00bbhttps:\/\/isga.ma\/isga\/wp-content\/uploads\/2022\/06\/futuristic-smart-city-with-5g-global-network-technology-scaled.jpg\u00a0\u00bb title_text=\u00a0\u00bbFuturistic smart city with 5G global network technology\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbsection\u00a0\u00bb module_id=\u00a0\u00bbcourse-overview\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; background_enable_color=\u00a0\u00bboff\u00a0\u00bb custom_css_main_element=\u00a0\u00bb box-shadow: 0px 0px 30px rgba(0, 0, 0, 0.2);\u00a0\u00bb transparent_background=\u00a0\u00bboff\u00a0\u00bb make_fullwidth=\u00a0\u00bboff\u00a0\u00bb use_custom_width=\u00a0\u00bboff\u00a0\u00bb width_unit=\u00a0\u00bbon\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbComp\u00e9tences et qualit\u00e9s du m\u00e9tier d\u2019ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information\u00a0\u00bb icon_placement=\u00a0\u00bbleft\u00a0\u00bb admin_label=\u00a0\u00bbOverview Content 1&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; header_font=\u00a0\u00bbRaleway|700|||||||\u00a0\u00bb header_text_align=\u00a0\u00bbleft\u00a0\u00bb header_text_color=\u00a0\u00bb#1c9576&Prime; header_font_size=\u00a0\u00bb21px\u00a0\u00bb body_font=\u00a0\u00bbSource Sans Pro||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbleft\u00a0\u00bb body_text_color=\u00a0\u00bb#555556&Prime; body_font_size=\u00a0\u00bb18.75px\u00a0\u00bb background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|10%|||false|false\u00a0\u00bb custom_css_blurb_content=\u00a0\u00bb max-width: 100%;\u00a0\u00bb use_border_color=\u00a0\u00bboff\u00a0\u00bb border_color=\u00a0\u00bb#ffffff\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb]<\/p>\n<ul>\n<li>Ses comp\u00e9tences techniques en mati\u00e8re de protection informatique ne sont plus \u00e0 prouver. Intuitif, il est capable d\u2019anticiper. Sa t\u00e9nacit\u00e9 lui permet de ne rien laisser passer. Gr\u00e2ce \u00e0 son grand sens de l\u2019analyse, il comprend une situation complexe et son contexte en un temps record. Son recul lui permet d\u2019agir sans stress. Son esprit synth\u00e9tique lui permet d\u2019\u00e9valuer la performance de protection dans sa globalit\u00e9.<\/li>\n<li>Vigilant et averti, il conna\u00eet la vuln\u00e9rabilit\u00e9 des syst\u00e8mes et les nouvelles techniques d\u2019intrusion. Il sait motiver et sensibiliser les collaborateurs qu\u2019il pilote pour mettre en place des proc\u00e9dures efficacement redoutables. <\/li>\n<li>Curieux et souple, il se remet en question et envisage de nouvelles solutions et proc\u00e9dures. Il doit s\u2019adapter en permanence en fonction des \u00e9volutions des risques. <\/li>\n<li>Bon communicant, il sait interagir avec diff\u00e9rents interlocuteurs. <\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbTendances et facteurs d&rsquo;\u00e9volution du m\u00e9tier d\u2019ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information\u00a0\u00bb icon_placement=\u00a0\u00bbleft\u00a0\u00bb admin_label=\u00a0\u00bbOverview Content 1&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; header_font=\u00a0\u00bbRaleway|700|||||||\u00a0\u00bb header_text_align=\u00a0\u00bbleft\u00a0\u00bb header_text_color=\u00a0\u00bb#1c9576&Prime; header_font_size=\u00a0\u00bb21px\u00a0\u00bb body_font=\u00a0\u00bbSource Sans Pro||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbleft\u00a0\u00bb body_text_color=\u00a0\u00bb#555556&Prime; body_font_size=\u00a0\u00bb18.75px\u00a0\u00bb background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|10%|||false|false\u00a0\u00bb custom_css_blurb_content=\u00a0\u00bb max-width: 100%;\u00a0\u00bb use_border_color=\u00a0\u00bboff\u00a0\u00bb border_color=\u00a0\u00bb#ffffff\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb]<\/p>\n<ul>\n<li>Les dirigeants ont aujourd\u2019hui largement conscience du risque en mati\u00e8re de s\u00e9curit\u00e9 informatique. Les cons\u00e9quences d\u2019une intrusion ou d\u2019une attaque virale peuvent \u00eatre d\u00e9vastatrices pour une entreprise. C\u2019est pourquoi le m\u00e9tier d\u2019ing\u00e9nieur en s\u00e9curit\u00e9 informatique est n\u00e9cessaire quel que soit le secteur d\u2019activit\u00e9. Il occupe donc une belle place sur le march\u00e9 de l\u2019emploi. <\/li>\n<li>Les techniques d\u2019intrusion \u00e9voluent, les syst\u00e8mes de protection aussi. Optimiser les r\u00e9seaux de s\u00e9curit\u00e9 est donc un challenge de tous les instants.\n<\/li>\n<li>La carri\u00e8re de l\u2019ing\u00e9nieur en s\u00e9curit\u00e9 informatique pourra s\u2019orienter vers un poste de directeur des syst\u00e8mes d\u2019information apr\u00e8s quelques ann\u00e9es \u00ab de terrain \u00bb. <\/li>\n<\/ul>\n<p>[\/et_pb_blurb][et_pb_testimonial admin_label=\u00a0\u00bbaxe1&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb]<\/p>\n<p><strong>L\u2019ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information porte la grande responsabilit\u00e9 de prot\u00e9ger la technologie d\u2019une organisation. Sa mission est un d\u00e9fi quotidien qui n\u00e9cessite sang-froid, organisation et anticipation. Il est le cyber-mousquetaire de l\u2019entreprise.  <\/strong> <\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#1c9576&Prime; locked=\u00a0\u00bboff\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbrow\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb make_fullwidth=\u00a0\u00bboff\u00a0\u00bb use_custom_width=\u00a0\u00bboff\u00a0\u00bb width_unit=\u00a0\u00bbon\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.9.7&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbPour faire ce m\u00e9tier l\u2019\u00e9tudiant doit s\u2019inscrire \u00e0 l\u2019ISGA dans la fili\u00e8re ing\u00e9nieurs parcours : Ing\u00e9nierie des R\u00e9seaux, Syst\u00e8mes et S\u00e9curit\u00e9.\u00a0\u00bb button_url=\u00a0\u00bbhttps:\/\/isga.ma\/isga\/cursus-et-specialisation\/#ingecursusup\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#1c9576&Prime;][\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c9galement nomm\u00e9 ing\u00e9nieur de la s\u00e9curit\u00e9 informatique, il \u00e9labore la politique de protection de l\u2019environnement informatique et technologique d\u2019une entreprise. Il con\u00e7oit une architecture pour prot\u00e9ger les syst\u00e8mes d\u2019information, en interne comme en externe (sites web, messageries, intranet, paiement en ligne, identification, droits d\u2019acc\u00e8s\u2026). Il d\u00e9finit, teste et r\u00e9ajuste les proc\u00e9dures. Un r\u00f4le majeur \u00e0 l\u2019heure des virus et des risques de hacking. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[66],"tags":[],"class_list":["post-7546","post","type-post","status-publish","format-standard","hentry","category-systemes-informatiques"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information - ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information - ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires\" \/>\n<meta property=\"og:description\" content=\"\u00c9galement nomm\u00e9 ing\u00e9nieur de la s\u00e9curit\u00e9 informatique, il \u00e9labore la politique de protection de l\u2019environnement informatique et technologique d\u2019une entreprise. Il con\u00e7oit une architecture pour prot\u00e9ger les syst\u00e8mes d\u2019information, en interne comme en externe (sites web, messageries, intranet, paiement en ligne, identification, droits d\u2019acc\u00e8s\u2026). Il d\u00e9finit, teste et r\u00e9ajuste les proc\u00e9dures. Un r\u00f4le majeur \u00e0 l\u2019heure des virus et des risques de hacking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/\" \/>\n<meta property=\"og:site_name\" content=\"ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T13:47:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-18T09:52:08+00:00\" \/>\n<meta name=\"author\" content=\"Malek Romdhani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Malek Romdhani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/\"},\"author\":{\"name\":\"Malek Romdhani\",\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/#\\\/schema\\\/person\\\/8752aa6e3dc08aa478b2d73aa80be347\"},\"headline\":\"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information\",\"datePublished\":\"2022-06-28T13:47:52+00:00\",\"dateModified\":\"2022-07-18T09:52:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/\"},\"wordCount\":1735,\"articleSection\":[\"Syst\u00e8mes informatiques\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/\",\"url\":\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/\",\"name\":\"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information - ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/#website\"},\"datePublished\":\"2022-06-28T13:47:52+00:00\",\"dateModified\":\"2022-07-18T09:52:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/#\\\/schema\\\/person\\\/8752aa6e3dc08aa478b2d73aa80be347\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/isga.ma\\\/isga\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/#website\",\"url\":\"https:\\\/\\\/isga.ma\\\/isga\\\/\",\"name\":\"ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires\",\"description\":\"Le chemin de la r\u00e9ussite depuis 1981\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/isga.ma\\\/isga\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/isga.ma\\\/isga\\\/#\\\/schema\\\/person\\\/8752aa6e3dc08aa478b2d73aa80be347\",\"name\":\"Malek Romdhani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dea94204f02b6c9a0265901123d687d8534af381e16f4301431378e641f8d838?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dea94204f02b6c9a0265901123d687d8534af381e16f4301431378e641f8d838?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dea94204f02b6c9a0265901123d687d8534af381e16f4301431378e641f8d838?s=96&d=mm&r=g\",\"caption\":\"Malek Romdhani\"},\"url\":\"https:\\\/\\\/isga.ma\\\/isga\\\/author\\\/romdhaniaivancity-ai\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information - ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information - ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires","og_description":"\u00c9galement nomm\u00e9 ing\u00e9nieur de la s\u00e9curit\u00e9 informatique, il \u00e9labore la politique de protection de l\u2019environnement informatique et technologique d\u2019une entreprise. Il con\u00e7oit une architecture pour prot\u00e9ger les syst\u00e8mes d\u2019information, en interne comme en externe (sites web, messageries, intranet, paiement en ligne, identification, droits d\u2019acc\u00e8s\u2026). Il d\u00e9finit, teste et r\u00e9ajuste les proc\u00e9dures. Un r\u00f4le majeur \u00e0 l\u2019heure des virus et des risques de hacking.","og_url":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/","og_site_name":"ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires","article_published_time":"2022-06-28T13:47:52+00:00","article_modified_time":"2022-07-18T09:52:08+00:00","author":"Malek Romdhani","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Malek Romdhani","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/#article","isPartOf":{"@id":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/"},"author":{"name":"Malek Romdhani","@id":"https:\/\/isga.ma\/isga\/#\/schema\/person\/8752aa6e3dc08aa478b2d73aa80be347"},"headline":"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information","datePublished":"2022-06-28T13:47:52+00:00","dateModified":"2022-07-18T09:52:08+00:00","mainEntityOfPage":{"@id":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/"},"wordCount":1735,"articleSection":["Syst\u00e8mes informatiques"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/","url":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/","name":"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information - ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires","isPartOf":{"@id":"https:\/\/isga.ma\/isga\/#website"},"datePublished":"2022-06-28T13:47:52+00:00","dateModified":"2022-07-18T09:52:08+00:00","author":{"@id":"https:\/\/isga.ma\/isga\/#\/schema\/person\/8752aa6e3dc08aa478b2d73aa80be347"},"breadcrumb":{"@id":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/isga.ma\/isga\/fiche-metier-ingenieur-en-architecture-et-administration-de-la-securite-des-systemes-dinformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/isga.ma\/isga\/"},{"@type":"ListItem","position":2,"name":"Fiche m\u00e9tier Ing\u00e9nieur en architecture et administration de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information"}]},{"@type":"WebSite","@id":"https:\/\/isga.ma\/isga\/#website","url":"https:\/\/isga.ma\/isga\/","name":"ISGA Institut Sup\u00e9rieur d&#039;Ing\u00e9nierie &amp; des Affaires","description":"Le chemin de la r\u00e9ussite depuis 1981","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/isga.ma\/isga\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/isga.ma\/isga\/#\/schema\/person\/8752aa6e3dc08aa478b2d73aa80be347","name":"Malek Romdhani","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/dea94204f02b6c9a0265901123d687d8534af381e16f4301431378e641f8d838?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dea94204f02b6c9a0265901123d687d8534af381e16f4301431378e641f8d838?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dea94204f02b6c9a0265901123d687d8534af381e16f4301431378e641f8d838?s=96&d=mm&r=g","caption":"Malek Romdhani"},"url":"https:\/\/isga.ma\/isga\/author\/romdhaniaivancity-ai\/"}]}},"_links":{"self":[{"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/posts\/7546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/comments?post=7546"}],"version-history":[{"count":6,"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/posts\/7546\/revisions"}],"predecessor-version":[{"id":7724,"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/posts\/7546\/revisions\/7724"}],"wp:attachment":[{"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/media?parent=7546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/categories?post=7546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isga.ma\/isga\/wp-json\/wp\/v2\/tags?post=7546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}