Skill description
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.
Guidance notes
Activities may include, but are not limited to:
- providing advice and guidance on the implementation and enforcement of security controls across all technological environments, including on-premise, cloud-based and automated systems.
- using security tools such as Security Information and Event Management (SIEM), Intrusion Detection/Prevention Systems (IDS/IPS) and firewalls, alongside the use of automation to streamline security operations.
- acting on threat intelligence to proactively address potential security threats.
- conducting routine vulnerability assessments, monitoring and analysing relevant logs, alerts and events, and responding to incidents submitted via tickets or phone.
- performing rapid analysis and remediation of security issues.
- ensuring compliance with relevant legislation, adherence to security policies and maintaining standard security operating procedures.
- keeping accurate security records and documentation.
- implementing, managing and monitoring cryptographic and certificate management activities to protect data, ensure compliance and manage cryptographic keys securely.
- using advanced reporting techniques for comprehensive security oversight and informed decision-making.
Level 1Follow
Performs simple security administration tasks.
Maintains relevant records and documentation, contributing to overall data integrity.
Level 2Assist
Receives and responds to routine requests for security support.
Maintains records and effectively communicates actions taken.
Assists in the investigation and resolution of issues relating to security systems using basic diagnostic tools and techniques.
Documents incident and event information and generates reports on exceptions and security events.
Contributes to management reporting processes.
Level 3Apply
Investigates minor security breaches using established procedures, incorporating analytical tools and techniques.
Performs non-standard operational security tasks adapting to evolving technologies and threat landscapes.
Addresses and resolves a variety of security events to maintain system integrity and operational continuity.
Level 4Enable
Maintains and optimises operational security processes.
Checks that all requests for support are dealt with according to established protocols, including for cloud-based and automated systems.
Provides advice on implementing and managing physical, procedural and technical security encompassing both physical and digital assets.
Investigates security breaches in accordance with established procedures using advanced tools and techniques and recommends necessary corrective actions.
Enables effective implementation of recommended security measures and monitors their performance.
Level 5Ensure, advise
Oversees security operations procedures, ensuring adherence and effectiveness, including cloud security practices and automated threat responses.
Reviews actual or potential security breaches and vulnerabilities and ensures they are promptly and thoroughly investigated.
Recommends actions and appropriate control improvements.
Ensures the integrity and completeness of security records, ensuring timely support and adherence to established procedures.
Contributes to the creation and maintenance of security policies, standards and procedures integrating new compliance requirements and technology advances.
Level 6Initiate, influence
Develops comprehensive policies, standards, processes and guidelines for organisational security across the entire digital landscape.
Ensures the ongoing relevance and effective implementation of security policies and standards, adapting to emerging technologies and threats.
Reviews and advises on security aspects of new business initiatives considering implications in the evolving digital landscape.
Leads strategic planning for security operations, integrating advanced threat intelligence and automation to enhance organisational resilience.
No notes added yet.
Comments
0 comments
Please sign in to leave a comment.