Technical Competencies
Technical Information and Understanding
1: N/A
Foundations of cyber safety, its significance, ideas, threats, vulnerabilities and assurance.
2: Design, construct, configure, optimise, take a look at and troubleshoot easy and sophisticated networks.
Community foundations, connections, internetworking, protocols, requirements, efficiency, safety and server virtualisation.
3: Apply statistical methods to giant information units. Determine vulnerabilities in huge information architectures and deployment.
Info administration, huge information ideas, statistical methods, database ideas and information high quality.
4: Construct take a look at and debug a digital system to a specification.
Laptop structure, digital logic, machine stage illustration of information.
5: Configure an Working System in accordance with safety coverage. Determine threats and options.
Working System rules, architectures, options, mechanisms, security measures and exploits.
6: Write, take a look at, debug packages in excessive and low stage languages and scripts.
Algorithm and program design, ideas, compilers and logic. Programming languages.
7: Design, implement and analyse algorithms.
Algorithms, complexity and discrete maths.
8: Assemble software program to work together with the actual world and analyse for safety exploits.
How software program interacts with the {hardware} and actual world atmosphere and safety points.
9: Analyse malware & establish its mechanisms.
Malware, reverse engineering, obfuscation.
10: Apply safe programming rules and design patterns to handle safety points.
Defensive programming, malware resistance, code evaluation, formal strategies, good apply.
11: Apply system engineering and software program improvement methodologies and fashions.
System improvement rules, instruments, approaches, complexity, software program engineering.
12: Uncover, establish and analyse threats, assault methods, vulnerabilities and mitigations.
Threats, vulnerabilities, impacts and mitigations in ICT methods and the enterprise atmosphere.
13: Assess tradition & particular person obligations.
Human dimensions of cyber safety.
14: Undertake moral system reconnaissance and intelligence evaluation.
Structured and moral intelligence evaluation, strategies, methods.
15: Undertake threat modelling, evaluation and trades.
Administration of cyber safety threat, instruments and methods.
16: Undertake threat evaluation to an exterior normal.
Quantitative & qualitative threat administration concept & apply, function of threat stakeholders.
17: Apply a administration system and develop an info safety administration plan.
Ideas & advantages of safety administration methods, governance & worldwide requirements.
18: Configure and use safety know-how elements and key administration.
Safety elements: how they’re used for safety / enterprise profit. Crypto & key administration.
19: Design & consider a system to a safety case.
How you can compose a justified safety case.
20: Architect, analyse & justify a safe system.
Perceive safety assurance, tips on how to obtain it and tips on how to apply safety rules
21: Develop an assurance technique.
Assurance ideas & approaches.
22: Safety monitoring, evaluation and intrusion detection. Recognise anomalies & behaviours.
How you can diagnose trigger from observables. Utility of SIEM (Safety Info and Occasion Administration) instruments & methods.
23: Handle intrusion response, together with with third events.
Cyber incident response, administration, escalation, investigation & third celebration involvement.
24: N/A
Authorized, regulatory, compliance & requirements atmosphere.
25: Organise testing & investigation work in accordance with authorized & moral necessities.
Applicability of legal guidelines rules & moral requirements.
26: Develop & apply info safety coverage to implement authorized or regulatory necessities.
Authorized obligations of system homeowners, customers, employers, workers.
Underpinning skilled, interpersonal and enterprise expertise
-
Fluent in written communications and capable of articulate complicated points.
-
Makes concise, partaking and well-structured verbal shows, arguments and explanations.
-
Capable of cope with totally different, competing pursuits inside and out of doors the organisation with wonderful negotiation expertise.
-
Capable of establish the preferences, motivations, strengths and limitations of different individuals and apply these insights to work extra successfully with and to inspire others.
-
Capable of work successfully with others to realize a typical objective.
-
Competent in lively listening and in main, influencing and persuading others.
-
Capable of give and obtain suggestions constructively and incorporate it into his/her personal improvement and life-long studying.
-
Analytical and demanding pondering expertise for Know-how Options improvement and might systematically analyse and apply structured drawback fixing methods to complicated methods and conditions.
-
Capable of put ahead, exhibit worth and acquire dedication to a reasonably complicated technology-oriented answer, demonstrating understanding of enterprise want, utilizing open questions and summarising expertise and primary negotiating expertise.
-
Can conduct efficient analysis, utilizing literature and different media.
-
Logical pondering and inventive method to drawback fixing.
-
Capable of exhibit a ‘safety mind-set’ (tips on how to break in addition to make).
Behaviours
-
Demonstrates enterprise disciplines, ethics and courtesies, demonstrating timeliness and focus when confronted with distractions and the power to finish duties to a deadline with prime quality.
-
Versatile perspective and skill to carry out underneath stress.
-
A radical method to work within the cyber safety function.