Technical Competencies
Technical Data and Understanding
1: N/A
Foundations of cyber safety, its significance, ideas, threats, vulnerabilities and assurance.
2: Design, construct, configure, optimise, check and troubleshoot easy and complicated networks.
Community foundations, connections, internetworking, protocols, requirements, efficiency, safety and server virtualisation.
3: Apply statistical methods to massive knowledge units. Establish vulnerabilities in massive knowledge architectures and deployment.
Info administration, massive knowledge ideas, statistical methods, database ideas and knowledge high quality.
4: Construct check and debug a digital system to a specification.
Laptop structure, digital logic, machine degree illustration of knowledge.
5: Configure an Working System in accordance with safety coverage. Establish threats and options.
Working System ideas, architectures, options, mechanisms, security measures and exploits.
6: Write, check, debug packages in excessive and low degree languages and scripts.
Algorithm and program design, ideas, compilers and logic. Programming languages.
7: Design, implement and analyse algorithms.
Algorithms, complexity and discrete maths.
8: Assemble software program to work together with the true world and analyse for safety exploits.
How software program interacts with the {hardware} and actual world surroundings and safety points.
9: Analyse malware & determine its mechanisms.
Malware, reverse engineering, obfuscation.
10: Apply safe programming ideas and design patterns to deal with safety points.
Defensive programming, malware resistance, code evaluation, formal strategies, good observe.
11: Apply system engineering and software program growth methodologies and fashions.
System growth ideas, instruments, approaches, complexity, software program engineering.
12: Uncover, determine and analyse threats, assault methods, vulnerabilities and mitigations.
Threats, vulnerabilities, impacts and mitigations in ICT programs and the enterprise surroundings.
13: Assess tradition & particular person duties.
Human dimensions of cyber safety.
14: Undertake moral system reconnaissance and intelligence evaluation.
Structured and moral intelligence evaluation, strategies, methods.
15: Undertake threat modelling, evaluation and trades.
Administration of cyber safety threat, instruments and methods.
16: Undertake threat evaluation to an exterior normal.
Quantitative & qualitative threat administration concept & observe, function of threat stakeholders.
17: Apply a administration system and develop an info safety administration plan.
Ideas & advantages of safety administration programs, governance & worldwide requirements.
18: Configure and use safety know-how elements and key administration.
Safety elements: how they’re used for safety / enterprise profit. Crypto & key administration.
19: Design & consider a system to a safety case.
Find out how to compose a justified safety case.
20: Architect, analyse & justify a safe system.
Perceive safety assurance, obtain it and apply safety ideas
21: Develop an assurance technique.
Assurance ideas & approaches.
22: Safety monitoring, evaluation and intrusion detection. Recognise anomalies & behaviours.
Find out how to diagnose trigger from observables. Software of SIEM (Safety Info and Occasion Administration) instruments & methods.
23: Handle intrusion response, together with with third events.
Cyber incident response, administration, escalation, investigation & third get together involvement.
24: N/A
Authorized, regulatory, compliance & requirements surroundings.
25: Organise testing & investigation work in accordance with authorized & moral necessities.
Applicability of legal guidelines laws & moral requirements.
26: Develop & apply info safety coverage to implement authorized or regulatory necessities.
Authorized duties of system house owners, customers, employers, workers.
Underpinning skilled, interpersonal and enterprise abilities
-
Fluent in written communications and capable of articulate advanced points.
-
Makes concise, participating and well-structured verbal displays, arguments and explanations.
-
In a position to take care of completely different, competing pursuits inside and outdoors the organisation with wonderful negotiation abilities.
-
In a position to determine the preferences, motivations, strengths and limitations of different individuals and apply these insights to work extra successfully with and to inspire others.
-
In a position to work successfully with others to attain a typical aim.
-
Competent in energetic listening and in main, influencing and persuading others.
-
In a position to give and obtain suggestions constructively and incorporate it into his/her personal growth and life-long studying.
-
Analytical and important considering abilities for Expertise Options growth and may systematically analyse and apply structured downside fixing methods to advanced programs and conditions.
-
In a position to put ahead, show worth and acquire dedication to a reasonably advanced technology-oriented resolution, demonstrating understanding of enterprise want, utilizing open questions and summarising abilities and primary negotiating abilities.
-
Can conduct efficient analysis, utilizing literature and different media.
-
Logical considering and inventive strategy to downside fixing.
-
In a position to show a ‘safety mind-set’ ( break in addition to make).
Behaviours
-
Demonstrates enterprise disciplines, ethics and courtesies, demonstrating timeliness and focus when confronted with distractions and the flexibility to finish duties to a deadline with prime quality.
-
Versatile angle and skill to carry out underneath strain.
-
An intensive strategy to work within the cyber safety function.