Cyber Security Technologist

Description

The primary role of a Cyber Security Technologist is to apply an understanding of cyber threats, hazards, risks, controls, measures and mitigations to protect organisations systems and people.

Those focused on the technical side work on areas such as security design & architecture, security testing, investigations & response.

Those focused on the risk analysis side focus on areas such as operations, risk, governance & compliance.

Whether focused on the technical or risk analysis side, all people in this occupation work to achieve required security outcomes in a legal and regulatory context in all parts of the economy. They develop and apply practical knowledge of information security to deliver solutions that fulfil an organisation’s requirements.

About

Course:  Cyber Security Technologist

Duration:  18+ months

Code:     CST/APP1

Dates:    Ask in Office

Fee:        Ask in Office

Contact Us

Tel:  020 8840 4496

Prerequisites

Individual employers will set the selection criteria, but this is likely to include A’ Levels, a relevant Level 3 apprenticeship, or other relevant qualifications, relevant experience and/or an aptitude test with a focus on functional maths.

Level 2 English and Maths (required)

Underpinning Skills, Attitudes and Behaviours

  • Logical and creative thinking skills
  • Analytical and problem solving skills
  • Ability to work independently and to take responsibility
  • Can use own initiative
  • A thorough and organised approach
  • Ability to work with a range of internal and external people
  • Ability to communicate effectively in a variety of situations
  • Maintain productive, professional and secure working environment

Target Audience

  • Cyber Operations Manager
  • Security Architect
  • Penetration Tester
  • Security Analyst
  • Risk Analyst
  • Intelligence Researcher
  • Security Sales Engineer
  • Cyber Security Specialist
  • Information Security Analyst
  • Governance & Compliance Analyst
  • Information Security Assurance & Threat Analyst
  • Forensics & Incident Response Analyst
  • Security Engineer
  • Information Security Auditor
  • Security Administrator
  • Information Security Officer

CORE

Threats, hazards, risks and intelligence

  • Discover (through a mix of research and practical exploration) vulnerabilities in a system
  • Analyse and evaluate security threats and hazards to a system or service or processes. Be aware of and demonstrate use of relevant external sources of threat intelligence or advice (e.g. CERT UK). Combine different sources to create an enriched view.
  • Research and investigate some common attack techniques and recommend how to defend against them. Be aware of and demonstrate use of relevant external sources of vulnerabilities (e.g. OWASP)
  • Undertake a security risk assessment for a simple system without direct supervision and propose basic remediation advice in the context of the employer.
  • Developing and using a security case
  • Source and analyse a security case (e.g. a Common Criteria Protection Profile for a security component) and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
  • Develop a simple security case without supervision. (A security case should describe the security objectives, threats, and for every identified attack technique identify mitigation or security controls that could include technical, implementation, policy or process).

Organisational context

  • Identify and follow organisational policies and standards for information and cyber security.
  • Operate according to service level agreements or employer defined performance targets.

Future Trends

  • Investigate different views of the future (using more than one external source) and trends in a relevant technology area and describe what this might mean for your business, with supporting reasoning.

Technologist Pathway

Design build & test a network (“Build a network”)

  • Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, that includes servers, hubs, switches, routers and user devices to a given design requirement without supervision. Provide evidence that the system meets the design requirement.

Analysing a security case (“Make the security case”)

  • Analyse security requirements (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.), given for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.

Structured and reasoned implementation of security in a network (“Build a secure network”)

Design and build a simple system in accordance with a simple security case. Provide evidence that the system has properly implemented the security controls required by the security case. The system could be either at the enterprise, network or application layer.

  • Select and configure relevant types of common security hardware and software components to implement a given security policy.
  • Design a system employing a crypto to meet defined security objectives. Develop and implement a key management plan for the given scenario/system.