Summary
As Cyber Security Manager you will work deliver an outcome-focused, professional and high-quality service.
You will play a key role in the team and be responsible for the day-to-day running of its prioritisation, planning audits and ensuring controls are correctly functioning through KRIs etc.
You will utilise your broad working knowledge of the field, and as a subject matter expert, provide expert advice to the team and senior leadership team.
You will build working relationships and work with a diverse group of stakeholders, communicating in a clear, concise, timely and effective manner.
Work Activity Components
Title | Details |
---|---|
Compliance (SCTY) (Level Five) | Reviews compliance with information security policies and standards. Assesses configurations and security procedures for adherence to legal and regulatory requirements. |
Controls and reviews (SCTY) (Level Five) | Conducts security control reviews across a full range of control types and techniques, for business applications and computer installations. Seeks guidance from more experienced or specialised practitioners as required. Recommends appropriate action to management. |
Leadership and management (SCTY) (Level Five) | Plans and leads the work of small teams of security staff, and acts as project manager on complex IT security specialism projects. |
Learning development (SCTY) (Level Five) | Delivers and contributes to the design and development of specialist IT security education and training to IT and system user management and staff. |
Policy and strategy (SCTY) (Level Five) | Contributes to development of information security policy, standards and guidelines. |
Risks and vulnerability (SCTY) (Level Five) | Identifies threats to the confidentiality, integrity, availability, accountability and relevant compliance of information systems. Conducts risk, vulnerability and business impact assessments of business applications and computer installations and recommends appropriate action to management. |
Security architecture (SCTY) (Level Five) | Designs the security components of systems architectures. Develops new architectures that manage the risks posed by new technologies and business practices. |
Security control service (SCTY) (Level Five) | Manages the operation of appropriate security controls as a production service to business system users. |
Security expertise (SCTY) (Level Five) | Provides authoritative advice and guidance on security strategies to manage identified risks and ensure adoption and adherence to standards. This includes advice on the application and operation of all types of security controls, including legislative or regulatory requirements such as data protection/GDPR and software copyright law. |
Threats and breaches (SCTY) (Level Five) | Investigates major breaches of security and recommends appropriate control improvements. Conducts investigation, analysis and review following breaches, and manages the investigation and resolution of security incidents, in accordance with established procedures including incident management procedures. Prepares recommendations for appropriate control improvements, involving other professionals as required. |
Advice and guidance (INAS) (Level Five) | Advises information and network users on information assurance architecture and strategies to manage identified risk, and promotes awareness of policies and procedures. Acts to ensure that they are aware of obligations such as protecting the secrecy of passwords and accounts access details. |
Business continuity and resilience (INAS) (Level Five) | In the context of business continuity, supports the assessment of the protection, detection, and reaction capabilities, to determine whether they are sufficient to support restoration of information systems in a secure manner. |
Data privacy and information security culture (INAS) (Level Five) | Champions organisational commitment to data privacy and information security. Promotes and supports a culture where data privacy and information security are the responsibility of every employee. Identifies opportunities for improving the security culture and delivers awareness training where appropriate. |
Implementation and processes (INAS) (Level Five) | Implements effective information security processes to support the organisation’s information assurance strategy and policies. |
Influencing partners (INAS) (Level Five) | Influences internal and external partners, including the supply chain, to ensure compliance with the organisation’s information security requirements. |
Performance measures (INAS) (Level Five) | Ensures effective reporting of information assurance metrics. Undertakes activities pertaining to improvements in information security maturity. |
Policies (INAS) (Level Five) | Interprets security and assurance policies and contributes to development of policies, standards and guidelines that comply with these, to enable effective assessment of risks to information availability, integrity, authentication and confidentiality. |
Risk assessment (INAS) (Level Five) | Carries out risk assessments of complex information systems and infrastructure components control effectiveness. Contributes to classification of data types held and audits of information systems. Contributes to data breach planning. |
Networking and communities (VURE) (Level 4) | Makes an active contribution to research communities. |
Reporting (VURE) (Level 4) | Reviews test results and modifies tests if necessary. Creates reports to communicate methodology, findings and conclusions. |
Research activities (VURE) (Level 4) | Designs and executes complex vulnerability research activities into new threats, attack vectors, risks and potential solutions. |
Tools and techniques (VUAS) (Level 4) | Contributes to the selection and deployment of vulnerability assessment tools and techniques. |
Threat intelligence gathering (THIN) (Level 4) | Performs threat intelligence gathering tasks. Collates and analyses information for threat intelligence requirements from a variety of sources. |
Threat modelling (THIN) (Level 4) | Undertakes routine threat modelling tasks. Analyses the significance and implication of process intelligence to identify trends, potential threat sources and their capabilities. |
Financial awareness (BURM) (Level 4) | Demonstrates financial awareness as a part of risk management (e.g. cost-effectiveness analysis of proposed counter measures). |
Risk countermeasures and response (BURM) (Level 4) | Assists with development of agreed countermeasures and contingency plans. |
Risk strategy, processes and monitoring (BURM) (Level 4) | Monitors status of risks, and reports status and need for action to senior colleagues. |
Career paths and mentoring (PEMT)(Level 4) | Coaches colleagues in developing target skills and capabilities in line with team and personal goals. |
Empowerment and role model (PEMT) (Level 4) | Facilitates effective working relationships between team members. Motivates team members to maintain a high level of performance. Engages with, and empowers team members. Acts as a role model for individuals and team members, setting a standard, acting professionally at all times and working to a professional code of conduct and ethics. |
Guidance, performance and feedback (PEMT)(Level 4) | Provides direction, support and guidance as necessary, in line with individual's skills and abilities and role expectations. Sets achievable goals, monitors and acknowledges performance. Makes learning recommendations to support individual and team development. Collects data on individual and team performance. Gives regular feedback to team members and leads them to achieve their full potential. |
Team dynamics (PEMT) (Level 4) | Integrates staff into teams to perform packages of work, taking account of individual and team capabilities. Considers the importance of skill mix within teams and is sensitive towards team dynamics. |
Behavioural Skills
Title | Details |
---|---|
Analytical Thinking | Acquiring a proper understanding of a problem or situation by breaking it down systematically into its component parts and identifying the relationships between these parts. Selecting the appropriate method/tool to resolve the problem and reflecting critically on the result, so that what is learnt is identified and assimilated. |
Attention to Detail | Applying specific quality standards to all tasks undertaken to ensure that deliverables are accurate and complete. |
Conceptual Thinking | Acquiring understanding and insights regarding the underlying issues in complex problems or situations through the development of abstract representations, the identification of patterns and the analysis of hypotheses. |
Delegation | Delegating tasks, responsibilities and authorities effectively. |
Flexibility | Taking account of new information or changed circumstances and/or business requirements and modifying response to a problem or situation accordingly. |
Follow-up and Monitoring | Checking progress against targets, taking action to resolve exceptions/ issues and reporting and escalating where necessary. |
Holistic Thinking | The ability to place problems in the context of the wider business landscape or area of interest. Understanding how different business functions work together to achieve shared goals. |
Influence, Persuasion and Personal Impact | Conveying a level of confidence and professionalism when engaging with stakeholders, influencing positively and persuading others to take a specific course of action when not in a position of authority. |
Information Acquisition | Identifying gaps in the available information required to understand a problem or situation and devising a means of resolving them. |
Initiative | Being proactive, anticipating opportunities for systems, service or product improvement or development and taking appropriate action(s). |
Interacting with People | Establishing relationships, contributing to an open culture and maintaining contacts with people from a variety of backgrounds and disciplines. Effective, approachable and sensitive communicator in different communities and cultures. Ability to adapt style and approach to meet the needs of different audiences. |
Organisational Awareness | Understanding the hierarchy and culture of own, customer, supplier and partner organisations and being able to identify the decision makers and influencers. |
Providing Direction | Directing others to undertake specified tasks within a defined timescale. |
Resilience | Demonstrates resilience when working under pressure, displaying a calm and rational approach to the task at hand. |
Teamwork | Working collaboratively with others to achieve a common goal. |
Technical Skills
Title | Details | Depth |
---|---|---|
Access Control Systems | Any tool or system which provides security access control (i.e. prevents unauthorised access to systems). | Proficient in |
Analytical Tools | Analytical, statistical and machine learning tools appropriate to the organisational environment. Able to apply these tools and techniques to meet the requirements of stakeholders. | Proficient in |
Application Systems | Technical or functional understanding of Commercial Off-the-Shelf (COTS) applications and/or other bespoke software deployed within the organisation in order to provide system configuration, audit, technical, and/or functional support. | Familiar with |
Big Data | The discipline associated with data sets so large and/or complex that traditional data processing applications are inadequate. The data files may include structured, unstructured and/or semi-structured data, such as unstructured text, audio, video, etc. Challenges include analysis, capture, curation, search, sharing, storage, transfer, manipulation, analysis, visualization and information privacy. | Familiar with |
Business Continuity Planning | Methods and techniques for risk assessment, business impact analysis, establishment of countermeasures and contingency arrangements relating to the serious disruption of IT services. | Familiar with |
Business Environment | The business environment relating to own sphere of work (own organisation and/or closely associated organisations, such as customers, suppliers, partners and competitors), in particular those aspects of the business that the specialism is to support (i.e. localised organisational awareness from a technical perspective). | Proficient in |
BYOD | The policy of permitting employees to bring personally owned mobile devices (laptops, tablets, smart phones etc) to their workplace, and the implications of using those devices to access privileged company information and applications consistent with safeguarding corporate systems and data taking account of security and confidentiality requirements. Also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC). | Proficient in |
Cloud/Virtualisation | The principles and application of cloud/ virtualisation (including ownership, responsibilities and security implications). Use of tools and systems to manage virtualised environments. | Proficient in |
Corporate, Industry and Professional Standards | Applying relevant standards, practices, codes, and assessment and certification programmes to the specific organisation or business domain. | Proficient in |
Cyber Security Concepts | The understanding of cyber security concepts and ability to effectively translate and accurately communicate security and risk implications across technical and non-technical stakeholders so that they are understood and applied. | Proficient in |
Disaster Recovery Planning | Methods and techniques for planning for, and mitigating against, serious disruption of IT services. Techniques may include data replication, log shipping, HA, resilience, fallback location/services, offsite back-up, recovery time objectives (RTO), recovery point objectives (RPO), maximum tolerable downtime window, cloud computing, diversity, etc. | Familiar with |
Information Architecture | Methods, techniques and technologies for ingesting, securing, processing and using data and information within and beyond an organisation. | Familiar with |
Infrastructure/System Security | The security threats and vulnerabilities that impact and/or emanate from system hardware, software and other infrastructure components, and relevant strategies, controls and activities to prevent, mitigate, detect and resolve security incidents affecting system hardware, software and other infrastructure components. | Proficient in |
IT Audit | Principles, practices, tools and techniques of IT auditing. | Familiar with |
IT Environment | The IT environment relating to own sphere of work (own organisation and/or closely associated organisations, such as customers, suppliers, partners), in particular own organisation's technical platforms and those that interface to them through the specialism, including those in closely-related organisations. | Familiar with |
National/International Standards | Current and emerging standards associated with IT practice nationally and internationally, published by authorities such as IEEE, IEC, BSI, ISO. | Familiar with |
Network Data Security | Network security and threat mitigation, including physical, electronic, firewalling, encryption, access, and authorisation; protecting data at rest and in transit; defending against viruses and malware; the impact of Big Data; and the integration of robust security controls into enterprise services and policies. | Proficient in |
Network Traffic Analysis | Methods and techniques for the capture of traffic information (packet level) and the forensic analysis of this information into its constituent elements. | Familiar with |
Networking and Communications | The planning and management of the interaction between two or more networking systems, computers or other intelligent devices. | Familiar with |
Operating Systems | System software that controls activities such as input, output, dynamic resource allocation, and error reporting, within the operation of a computer configuration. | Proficient in |
Operational/Service Architecture | Knowledge of the IT/IS infrastructure and the IT applications and service processes used within own organisation, including those associated with sustainability and efficiency. | Proficient in |
Own Organisation's IT Products and Services | The IT products and/or services supplied to internal and external customers by own organisation. | Familiar with |
Security Software, Tools and Techniques | Specialist tools and techniques used in the pursuit of vulnerability management, penetration testing , digital forensics and other security management disciplines for bug-hunting, abstract interpretation and program analysis, binary analysis and reverse-engineering, exploit development, source code analysis, and static and dynamic application security testing (SAST/DAST) etc. | Proficient in |
Third Party IT Products and Services | The IT products and/or services supplied to own organisation by external suppliers. | Familiar with |
Other Skills
Title | Details | Depth |
---|---|---|
Appraisal Techniques | Methods and techniques for appraising an individual's performance and potential. | Familiar with |
Budgets | Principles, methods, techniques and tools for the preparation and monitoring of budgets to manage costs and ensure cost-effectiveness and value for money. | Aware of |
Coaching Techniques | Methods and techniques for coaching individuals or groups by a balanced combination of support and direction, which could include use of virtual learning environments plus add-ons to augment feedback specific to work items, workflow or career plans. | Familiar with |
Data Protection | Principles, practices, tools and techniques to ensure data protection. | Proficient in |
Disciplinary Issues and Procedures | Managing episodes of unsatisfactory behaviour or performance in accordance with appropriate policies and legislative conformance. Includes changes to circumstances, such as sickness, disability and other personal issues. | Aware of |
Document Management Techniques | Methods and techniques for the organisation, storage and version control of information in both paper and electronic formats. | Proficient in |
Enterprise Architecture | Understanding of Enterprise Architecture principles and practises, e.g. as defined within TOGAF, used to create a strategic framework to align the organisation's business strategy, processes, information, and technology to satisfy business goals. Enterprise architecture provides a holistic view of the organisation, enabling effective decision-making, optimisation of resources, and more efficient adaptation to change in the business environment. | Familiar with |
Information Assurance Methods and Tools | Information assurance methods, tools and techniques (including the Caldicott Principles) used to protect the integrity, availability, authenticity, non-repudiation and confidentiality of user data and manage the risks related to the use, processing, storage, and transmission of information. | Proficient in |
Legislation | Relevant national and international legislation. | Proficient in |
Literature Search | Methods, techniques and tools for searching and obtaining relevant knowledge from published literature. | Proficient in |
Network Data Gathering Techniques | The selection, implementation and application of network data gathering methods, tools and techniques that are appropriate to the information required and the sources available. | Proficient in |
Performance Monitoring | Identifying, agreeing and monitoring (usually by face-to-face interviews) objectives and deliverables with individuals. Identifying under-performance issues against agreed quality standards and performance criteria. Identifying gaps in capability and causes, disciplinary or ability-related (needing assistance, training or other support). | Familiar with |
Presentation Techniques | Methods and techniques for delivering effective and accessible presentations, either face-to-face or online within various contexts and to a variety of audiences. | Proficient in |
Process Documentation Techniques | Principles, methods and techniques for establishing, documenting and maintaining processes. | Familiar with |
Project Planning and Control Techniques | Methods and techniques associated with planning and monitoring progress of projects. | Aware of |
Project Risk Management | The identification, assessment and management of project risks, that could result in time or cost over-runs, or failure to deliver products which are fit for purpose. | Familiar with |
Report Writing Techniques | Methods and techniques for writing clear, accessible and persuasive reports. | Familiar with |
Research Techniques | Methods, techniques and tools for the systematic discovery, analysis, and reporting of knowledge about all aspects of information systems. | Proficient in |
Resource Allocation | The effective and efficient routine deployment of resources, (but also including reassessment and reallocation in a dynamic multi-project environment), to achieve optimum results. | Familiar with |
Risk Management | Methods and techniques for the assessment and management of business risk. | Proficient in |
Stakeholder Engagement | Establishing relationships, analysing perspectives and managing stakeholders from a variety of backgrounds and disciplines. Adapting stakeholder engagement style to meet the needs of different audiences. The identification of key business stakeholders and an assessment of their level of power and interests, and their perspectives to inform the way(s) in which they should be considered and managed. | Aware of |
Standards Writing Techniques | Principles, methods and techniques for establishing, documenting, and maintaining standards. | Familiar with |
Team Dynamics | Knowledge and understanding of the psychological and environmental forces that influence the direction of team behavior and performance and the tools and techniques to improve team cohesion and performance. | Aware of |
Techniques for Effective Meetings | Methods and techniques for running effective meetings and for understanding and influencing the roles played by participants. | Familiar with |
Threat Landscape | Knowledge and understanding of the threat landscape, regulatory and legislative requirements and awareness of industry good practice relating to information governance, privacy and security. | Proficient in |
Training
Title | Details |
---|---|
Coaching | Concepts, methods and techniques for providing coaching in subject specialisms to individuals or groups (e.g. GROW model). |
Data Management | Data management concepts, methods, tools and techniques relating to the planning, development, implementation, administration and curation of data. |
Local Area Networks | Features and characteristics of local area networks relevant to installation and support of hardware and software components. |
Mentoring | Methods and techniques for providing mentoring support to less experienced individuals. |
Network Infrastructure Architecture | The frameworks and principles on which networks, systems, equipment and resources are based. |
Software Configuration | Installation, configuration and tuning of applications or systems software. |
Wide Area Networks | Features and characteristics of networks configured over a wide area i.e. beyond the geographical boundaries of a single site. |
Professional Development Activity (PDA)
Title | Details | PDA Group |
---|---|---|
Deputising | Standing in for supervisor or manager on a temporary basis during periods of absence. | Broadening Activities |
Gaining Knowledge of Activities of Employing Organisation | Developing an understanding of the potentially diverse range of activities (service, governance, administrative, regulatory, commercial, charitable, industrial, etc.) undertaken by the employing organisation. | Increasing Knowledge |
Gaining Knowledge of IT Concepts and Techniques | Undertaking study, learning and, where possible, practice in IT concepts and techniques external to own function. | Increasing Knowledge |
Job Shadowing and Special Assignments | Undertaking temporary periods or secondments in other roles, particularly those that offer a new perspective on own function or exposure to other environments and cultures. | Broadening Activities |
Negotiating and Influencing | Undertaking learning and practice of negotiating with and influencing others. | Developing Professional Skills |
Participation in Professional Body Affairs | Taking an active part in professional body affairs at branch, specialist group, committee or board level. | Participation in Professional Activities |
Research Assignments | Exploring a topic which is not part of own normal responsibilities and presenting findings to colleagues and/or management | Increasing Knowledge |
Team Leadership | Undertaking learning and practice of the skills required to lead teams, including motivation, direction, coaching, delegation, appraisal, counselling and developing others. | Developing Professional Skills |
Qualification Components
Title | Awarding Bodies |
---|---|
FEDIP Advanced Practitioner | The Federation for Informatics Professionals |
BCS Certificate in Information Security Management Principles (CISMP) | BCS The Chartered Institute for IT |
BCS Practitioner Certificate in Information Risk Management | BCS The Chartered Institute for IT |
CISM Certified Information Security Manager | ISACA |
CISSP Certified Information Systems Security Professional | (ISC)2 International Information Systems Security Certification Consortium |
CRISC Certified in Risk and Information Systems Control | ISACA |
Principal Cyber Security Professional (PCSP) | The UK Cyber Security Council |
The Professional Body Responsible for this job family is BCS. This job role profile was created in collaboration with BCS, using Role Model Plus.