Summary
As Cyber Security Manager you will deliver an outcome-focused, professional and high-quality service.
You will play a key role in the team and be responsible for the day to day running of the cyber security team.
You will utilise your broad working knowledge of the field, and as a subject matter expert, provide expert advice to the cyber and senior leadership team.
You will build working relationships and work with a diverse group of stakeholders, communicating in a clear, concise, timely and effective manner.
Work Activity Components
| Title | Details |
|---|---|
| Advice (THIN) (Level 4) | Provides advice on threat intelligence activities to help others understand and mitigate vulnerabilities or to respond to security incidents. |
| Information review (THIN) (Level 4) | Contributes to reviewing, ranking and categorising qualitative threat intelligence information. |
| Reporting (THIN) (Level 4) | Creates threat intelligence reports |
| Source evaluation (THIN) (Level 4) | Evaluates the value, usefulness and impact of sources of threat intelligence sources. |
| Threat intelligence gathering (THIN) (Level 4) | Performs threat intelligence gathering tasks. Collates and analyses information for threat intelligence requirements from a variety of sources. |
| Threat modelling (THIN) (Level 4) | Undertakes routine threat modelling tasks. Analyses the significance and implication of process intelligence to identify trends, potential threat sources and their capabilities. |
| Auditable records (SCAD) (Level 4) | For all services and systems within identified remit, maintains auditable records and user documentation. Assists in the preparation and maintenance of other documentation such as business recovery plans, particularly in the data collection and compilation/production/distribution phases of the exercise. |
| Policies, standards, processes and guidelines (SCAD) (Level 4) | Maintains security administration processes, and checks that all requests for support are dealt with according to agreed procedures. |
| Security advice (SCAD) (Level 4) | Provides advice and handles enquiries relating to security, contingency planning and related activities. Acts as subject matter expert for security administration activities. |
| Violation and security breach (SCAD) (Level 4) | Investigates security breaches in accordance with established procedures and security standards, and recommends required actions and support/follows-up to ensure these are implemented. Investigates and reconciles violation reports and logs generated by automated systems. Where appropriate (i.e. involving employees within own organisation) interviews minor offenders and compiles reports and recommendations for management follow-up. |
| Assessment documentation (VUAS) (Level 4) | Documents a full vulnerability assessment and business impact analysis conducted on medium complexity information systems. |
| Communication and awareness (VUAS) (Level 4) | Promotes security awareness and communicates information on security risks and potential business impact to senior business managers and others. |
| Critical information and technology assets (VUAS) (Level 4) | Allocates an impact level to critical information and technology assets should their confidentiality, integrity or availability be breached. Collates and analyses catalogues of information and technology assets for vulnerability assessment. |
| Risk assessment (VUAS) (Level 4) | Produces a risk assessment table to determine the likelihood and impact to an information or technology asset if a vulnerability is exposed to a threat source, assigning a likelihood and impact to determine risk level. Documents the business impact of a vulnerability being breached. |
| Risk mitigation (VUAS) (Level 4) | Delivers risk treatment plans using one or more recognised control sets. |
| Tools and techniques (VUAS) (Level 4) | Contributes to the selection and deployment of vulnerability assessment tools and techniques. |
| Vulnerability assessment (VUAS) (Level 4) | Conducts automated and manual vulnerability assessments and business impact analyses. Creates test cases using in-depth technical analysis of risks and typical vulnerabilities. Assesses effectiveness of security controls for infrastructure and application components, and recommends remedial action. |
| Vulnerability identification and analysis (VUAS) (Level 4) | Assesses the potential vulnerabilities identified against established vulnerability databases. |
| Career paths and mentoring (PEMT)(Level 4) | Coaches colleagues in developing target skills and capabilities in line with team and personal goals. |
| Empowerment and role model (PEMT) (Level 4) | Facilitates effective working relationships between team members. Motivates team members to maintain a high level of performance. Engages with, and empowers team members. Acts as a role model for individuals and team members, setting a standard, acting professionally at all times and working to a professional code of conduct and ethics. |
| Guidance, performance and feedback (Level 4) | Provides direction, support and guidance as necessary, in line with individual's skills and abilities setting appropriate and effective boundaries. Sets achievable goals, monitoring and acknowledging performance and supporting individual and team development. Collects data on individual and team performance. Gives regular feedback to team members and leads them to achieve their full potential. |
| Team dynamics (PEMT) (Level 4) | Integrates staff into teams to perform packages of work, taking account of individual and team capabilities. Considers the importance of skill mix within teams and is sensitive towards team dynamics. |
| Work allocation, support and delegation (PEMT) (Level 4) | Allocates routine tasks and assigns project work to individuals, according to their particular skills, capabilities, and development needs. |
Behavioural Skills
| Title | Details |
|---|---|
| Ambiguity | Comfortable dealing with ambiguity and operating in environments that evolve and change. |
| Analytical Thinking | Acquiring a proper understanding of a problem or situation by breaking it down systematically into its component parts and identifying the relationships between these parts. Selecting the appropriate method/tool to resolve the problem and reflecting critically on the result, so that what is learnt is identified and assimilated. |
| Attention to Detail | Applying specific quality standards to all tasks undertaken to ensure that deliverables are accurate and complete. |
| Conceptual Thinking | Acquiring understanding and insights regarding the underlying issues in complex problems or situations through the development of abstract representations, the identification of patterns and the analysis of hypotheses. |
| Customer Focus | Understanding the needs of the internal or external customer and keeping these in mind when taking actions or making decisions. |
| Delegation | Delegating tasks, responsibilities and authorities effectively. |
| Follow-up and Monitoring | Checking progress against targets, taking action to resolve exceptions/ issues and reporting and escalating where necessary. |
| Holistic Thinking | The ability to place problems in the context of the wider business landscape or area of interest. Understanding how different business functions work together to achieve shared goals. |
| Influence, Persuasion and Personal Impact | Conveying a level of confidence and professionalism when engaging with stakeholders, influencing positively and persuading others to take a specific course of action when not in a position of authority. |
| Information Acquisition | Identifying gaps in the available information required to understand a problem or situation and devising a means of resolving them. |
| Interacting with People | Establishing relationships, contributing to an open culture and maintaining contacts with people from a variety of backgrounds and disciplines. Effective, approachable and sensitive communicator in different communities and cultures. Ability to adapt style and approach to meet the needs of different audiences. |
| Organisational Awareness | Understanding the hierarchy and culture of own, customer, supplier and partner organisations and being able to identify the decision makers and influencers. |
| Providing Direction | Directing others to undertake specified tasks within a defined timescale. |
| Resilience | Demonstrates resilience when working under pressure, displaying a calm and rational approach to the task at hand. |
| Teamwork | Working collaboratively with others to achieve a common goal. |
Technical Skills
| Title | Details | Depth |
|---|---|---|
| Access Control Systems | Any tool or system which provides security access control (i.e. prevents unauthorised access to systems). | Proficient in |
| Analytical Tools | Analytical, statistical and machine learning tools appropriate to the organisational environment. Able to apply these tools and techniques to meet the requirements of stakeholders. | Proficient in |
| Application Systems | Technical or functional understanding of Commercial Off-the-Shelf (COTS) applications and/or other bespoke software deployed within the organisation in order to provide system configuration, audit, technical, and/or functional support. | Familiar with |
| Big Data | The discipline associated with data sets so large and/or complex that traditional data processing applications are inadequate. The data files may include structured, unstructured and/or semi-structured data, such as unstructured text, audio, video, etc. Challenges include analysis, capture, curation, search, sharing, storage, transfer, manipulation, analysis, visualization and information privacy. | Aware of |
| Business Environment | The business environment relating to own sphere of work (own organisation and/or closely associated organisations, such as customers, suppliers, partners and competitors), in particular those aspects of the business that the specialism is to support (i.e. localised organisational awareness from a technical perspective). | Familiar with |
| BYOD | The policy of permitting employees to bring personally owned mobile devices (laptops, tablets, smart phones etc) to their workplace, and the implications of using those devices to access privileged company information and applications consistent with safeguarding corporate systems and data taking account of security and confidentiality requirements. Also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC). | Familiar with |
| Cloud/Virtualisation | The principles and application of cloud/ virtualisation (including ownership, responsibilities and security implications). Use of tools and systems to manage virtualised environments. | Familiar with |
| Configuration Management | The discipline that gives precise control over IT assets and components by recording and maintaining information about the 'configuration items', including hardware devices, computer programs, software licences, documentation, network devices, and data centre facilities (virtualised and static). | Familiar with |
| Corporate, Industry and Professional Standards | Applying relevant standards, practices, codes, and assessment and certification programmes to the specific organisation or business domain. | Familiar with |
| Cyber Security Concepts | The understanding of cyber security concepts and ability to effectively translate and accurately communicate security and risk implications across technical and non-technical stakeholders so that they are understood and applied. | Proficient in |
| Infrastructure Configuration | Knowledge and understanding of infrastructure configurations. | Familiar with |
| Infrastructure/System Security | The security threats and vulnerabilities that impact and/or emanate from system hardware, software and other infrastructure components, and relevant strategies, controls and activities to prevent, mitigate, detect and resolve security incidents affecting system hardware, software and other infrastructure components. | Proficient in |
| IT Environment | The IT environment relating to own sphere of work (own organisation and/or closely associated organisations, such as customers, suppliers, partners), in particular own organisation's technical platforms and those that interface to them through the specialism, including those in closely-related organisations. | Proficient in |
| Middleware | Software which forms part of the operating platform infrastructure. | Familiar with |
| National/International Standards | Current and emerging standards associated with IT practice nationally and internationally, published by authorities such as IEEE, IEC, BSI, ISO. | Familiar with |
| Network Data Security | Network security and threat mitigation, including physical, electronic, firewalling, encryption, access, and authorisation; protecting data at rest and in transit; defending against viruses and malware; the impact of Big Data; and the integration of robust security controls into enterprise services and policies. | Proficient in |
| Network Traffic Analysis | Methods and techniques for the capture of traffic information (packet level) and the forensic analysis of this information into its constituent elements. | Familiar with |
| Networking and Communications | The planning and management of the interaction between two or more networking systems, computers or other intelligent devices. | Proficient in |
| Operating Systems | System software that controls activities such as input, output, dynamic resource allocation, and error reporting, within the operation of a computer configuration. | Proficient in |
| Operational/Service Architecture | Knowledge of the IT/IS infrastructure and the IT applications and service processes used within own organisation, including those associated with sustainability and efficiency. | Familiar with |
| Own Organisation's IT Products and Services | The IT products and/or services supplied to internal and external customers by own organisation. | Familiar with |
| Security Software, Tools and Techniques | Specialist tools and techniques used in the pursuit of vulnerability management, penetration testing , digital forensics and other security management disciplines for bug-hunting, abstract interpretation and program analysis, binary analysis and reverse-engineering, exploit development, source code analysis, and static and dynamic application security testing (SAST/DAST) etc. | Familiar with |
| Third Party IT Products and Services | The IT products and/or services supplied to own organisation by external suppliers. | Familiar with |
Other Skills
| Title | Details | Depth |
|---|---|---|
| Appraisal Techniques | Methods and techniques for appraising an individual's performance and potential. | Familiar with |
| Budgets | Principles, methods, techniques and tools for the preparation and monitoring of budgets to manage costs and ensure cost-effectiveness and value for money. | Aware of |
| Coaching Techniques | Methods and techniques for coaching individuals or groups by a balanced combination of support and direction, which could include use of virtual learning environments plus add-ons to augment feedback specific to work items, workflow or career plans. | Familiar with |
| Disciplinary Issues and Procedures | Managing episodes of unsatisfactory behaviour or performance in accordance with appropriate policies and legislative conformance. Includes changes to circumstances, such as sickness, disability and other personal issues. | Aware of |
| Document Management Techniques | Methods and techniques for the organisation, storage and version control of information in both paper and electronic formats. | Familiar with |
| Legislation | Relevant national and international legislation. | Proficient in |
| Literature Search | Methods, techniques and tools for searching and obtaining relevant knowledge from published literature. | Proficient in |
| Network Data Gathering Techniques | The selection, implementation and application of network data gathering methods, tools and techniques that are appropriate to the information required and the sources available. | Proficient in |
| Performance Monitoring | Identifying, agreeing and monitoring (usually by face-to-face interviews) objectives and deliverables with individuals. Identifying under-performance issues against agreed quality standards and performance criteria. Identifying gaps in capability and causes, disciplinary or ability-related (needing assistance, training or other support). | Familiar with |
| Presentation Techniques | Methods and techniques for delivering effective and accessible presentations, either face-to-face or online within various contexts and to a variety of audiences. | Familiar with |
| Process Documentation Techniques | Principles, methods and techniques for establishing, documenting and maintaining processes. | Aware of |
| Process Improvement Techniques | Methods, tools and techniques to analyse and optimise processes in order to improve the quality of a product or service. | Aware of |
| Project Planning and Control Techniques | Methods and techniques associated with planning and monitoring progress of projects. | Aware of |
| Report Writing Techniques | Methods and techniques for writing clear, accessible and persuasive reports. | Familiar with |
| Research Techniques | Methods, techniques and tools for the systematic discovery, analysis, and reporting of knowledge about all aspects of information systems. | Proficient in |
| Resource Allocation | The effective and efficient routine deployment of resources, (but also including reassessment and reallocation in a dynamic multi-project environment), to achieve optimum results. | Familiar with |
| Risk Management | Methods and techniques for the assessment and management of business risk. | Proficient in |
| Stakeholder Engagement | Establishing relationships, analysing perspectives and managing stakeholders from a variety of backgrounds and disciplines. Adapting stakeholder engagement style to meet the needs of different audiences. The identification of key business stakeholders and an assessment of their level of power and interests, and their perspectives to inform the way(s) in which they should be considered and managed. | Aware of |
| Standards Writing Techniques | Principles, methods and techniques for establishing, documenting, and maintaining standards. | Aware of |
| Team Dynamics | Knowledge and understanding of the psychological and environmental forces that influence the direction of team behavior and performance and the tools and techniques to improve team cohesion and performance. | Aware of |
| Techniques for Effective Meetings | Methods and techniques for running effective meetings and for understanding and influencing the roles played by participants. | Aware of |
| Threat Landscape | Knowledge and understanding of the threat landscape, regulatory and legislative requirements and awareness of industry good practice relating to information governance, privacy and security. | Familiar with |
Training
| Title | Details |
|---|---|
| Coaching | Concepts, methods and techniques for providing coaching in subject specialisms to individuals or groups (e.g. GROW model). |
| Data Protection and GDPR | Data protection legislation, regulatory framework and compliance, including GDPR (General Data Protection Act). |
| Local Area Networks | Features and characteristics of local area networks relevant to installation and support of hardware and software components. |
| Mentoring | Methods and techniques for providing mentoring support to less experienced individuals. |
| Protocol Analysis | Communication protocol analysis techniques and interpretation of results. |
| Security Software | Understanding the security threats and vulnerabilities that impact and/or emanate from system hardware, software and other infrastructure components and relevant strategies, controls and activities to prevent, mitigate, detect and resolve security incidents. For example access control software like Active Directory (AD). |
| Service Delivery | The service delivery processes: the systems, products, services, hardware and software environment. |
| Software Configuration | Installation, configuration and tuning of applications or systems software. |
| Wide Area Networks | Features and characteristics of networks configured over a wide area i.e. beyond the geographical boundaries of a single site. |
Professional Development Activity (PDA)
| Title | Details | PDA Group |
|---|---|---|
| Deputising | Standing in for supervisor or manager on a temporary basis during periods of absence. | Broadening Activities |
| Gaining Knowledge of Activities of Employing Organisation | Developing an understanding of the potentially diverse range of activities (service, governance, administrative, regulatory, commercial, charitable, industrial, etc.) undertaken by the employing organisation. | Increasing Knowledge |
| Gaining Knowledge of IT Concepts and Techniques | Undertaking study, learning and, where possible, practice in IT concepts and techniques external to own function. | Increasing Knowledge |
| Job Shadowing and Special Assignments | Undertaking temporary periods or secondments in other roles, particularly those that offer a new perspective on own function or exposure to other environments and cultures. | Broadening Activities |
| Negotiating and Influencing | Undertaking learning and practice of negotiating with and influencing others. | Developing Professional Skills |
| Participation in Professional Body Affairs | Taking an active part in professional body affairs at branch, specialist group, committee or board level. | Participation in Professional Activities |
| Research Assignments | Exploring a topic which is not part of own normal responsibilities and presenting findings to colleagues and/or management | Increasing Knowledge |
| Team Leadership | Undertaking learning and practice of the skills required to lead teams, including motivation, direction, coaching, delegation, appraisal, counselling and developing others. | Developing Professional Skills |
Qualification Components
| Title | Awarding Bodies |
|---|---|
| FEDIP Advanced Practitioner | The Federation for Informatics Professionals |
| CISSP Certified Information Systems Security Professional | (ISC)2 International Information Systems Security Certification Consortium |
| ISSMP Information Systems Security Management Professional | (ISC)2 International Information Systems Security Certification Consortium |
| Principal Cyber Security Professional (PCSP) | The UK Cyber Security Council |
The Professional Body Responsible for this job family is BCS. This job role profile was created in collaboration with BCS, using Role Model Plus.
