Technical Competencies                                            

Technical Information and Understanding               


1: N/A

Foundations of cyber safety, its significance, ideas, threats, vulnerabilities and assurance.


2: Design, construct, configure, optimise, take a look at and troubleshoot easy and sophisticated networks.

Community foundations, connections, internetworking, protocols, requirements, efficiency, safety and server virtualisation.


3: Apply statistical methods to giant information units. Determine vulnerabilities in huge information architectures and deployment.

Info administration, huge information ideas, statistical methods, database ideas and information high quality.


4: Construct take a look at and debug a digital system to a specification.

Laptop structure, digital logic, machine stage illustration of information.


5: Configure an Working System in accordance with safety coverage. Determine threats and options.

Working System rules, architectures, options, mechanisms, security measures and exploits.


6: Write, take a look at, debug packages in excessive and low stage languages and scripts.

Algorithm and program design, ideas, compilers and logic. Programming languages.


7: Design, implement and analyse algorithms.

Algorithms, complexity and discrete maths.


8: Assemble software program to work together with the actual world and analyse for safety exploits.

How software program interacts with the {hardware} and actual world atmosphere and safety points.


9: Analyse malware & establish its mechanisms.

Malware, reverse engineering, obfuscation.


10: Apply safe programming rules and design patterns to handle safety points.

Defensive programming, malware resistance, code evaluation, formal strategies, good apply.


11: Apply system engineering and software program improvement methodologies and fashions.

System improvement rules, instruments, approaches, complexity, software program engineering.


12: Uncover, establish and analyse threats, assault methods, vulnerabilities and mitigations.

Threats, vulnerabilities, impacts and mitigations in ICT methods and the enterprise atmosphere.


13: Assess tradition & particular person obligations.

Human dimensions of cyber safety.


14: Undertake moral system reconnaissance and intelligence evaluation.

Structured and moral intelligence evaluation, strategies, methods.


15: Undertake threat modelling, evaluation and trades.

Administration of cyber safety threat, instruments and methods.


16: Undertake threat evaluation to an exterior normal.

Quantitative & qualitative threat administration concept & apply, function of threat stakeholders.


17: Apply a administration system and develop an info safety administration plan.

Ideas & advantages of safety administration methods, governance & worldwide requirements.


18: Configure and use safety know-how elements and key administration.

Safety elements: how they’re used for safety / enterprise profit. Crypto & key administration.


19: Design & consider a system to a safety case.

How you can compose a justified safety case.


20: Architect, analyse & justify a safe system.

Perceive safety assurance, tips on how to obtain it and tips on how to apply safety rules


21: Develop an assurance technique.

Assurance ideas & approaches.


22: Safety monitoring, evaluation and intrusion detection. Recognise anomalies & behaviours.

How you can diagnose trigger from observables. Utility of SIEM (Safety Info and Occasion Administration) instruments & methods.


23: Handle intrusion response, together with with third events.

Cyber incident response, administration, escalation, investigation & third celebration involvement.


24: N/A

Authorized, regulatory, compliance & requirements atmosphere.


25: Organise testing & investigation work in accordance with authorized & moral necessities.

Applicability of legal guidelines rules & moral requirements.


26: Develop & apply info safety coverage to implement authorized or regulatory necessities.

Authorized obligations of system homeowners, customers, employers, workers.


Underpinning skilled, interpersonal and enterprise expertise

 

  • Fluent in written communications and capable of articulate complicated points. 

  • Makes concise, partaking and well-structured verbal shows, arguments and explanations. 

  • Capable of cope with totally different, competing pursuits inside and out of doors the organisation with wonderful negotiation expertise. 

  • Capable of establish the preferences, motivations, strengths and limitations of different individuals and apply these insights to work extra successfully with and to inspire others. 

  • Capable of work successfully with others to realize a typical objective. 

  • Competent in lively listening and in main, influencing and persuading others. 

  • Capable of give and obtain suggestions constructively and incorporate it into his/her personal improvement and life-long studying. 

  • Analytical and demanding pondering expertise for Know-how Options improvement and might systematically analyse and apply structured drawback fixing methods to complicated methods and conditions. 

  • Capable of put ahead, exhibit worth and acquire dedication to a reasonably complicated technology-oriented answer, demonstrating understanding of enterprise want, utilizing open questions and summarising expertise and primary negotiating expertise. 

  • Can conduct efficient analysis, utilizing literature and different media. 

  • Logical pondering and inventive method to drawback fixing. 

  • Capable of exhibit a ‘safety mind-set’ (tips on how to break in addition to make).

Behaviours

  • Demonstrates enterprise disciplines, ethics and courtesies, demonstrating timeliness and focus when confronted with distractions and the power to finish duties to a deadline with prime quality. 

  • Versatile perspective and skill to carry out underneath stress. 

  • A radical method to work within the cyber safety function.




Source_link

Leave a Reply

Your email address will not be published. Required fields are marked *