Cyber Security Manager (Operations)

Summary

As Cyber Security Manager you will deliver an outcome-focused, professional and high-quality service.

You will play a key role in the team and be responsible for the day to day running of the cyber security team.

You will utilise your broad working knowledge of the field, and as a subject matter expert, provide expert advice to the cyber and senior leadership team.

You will build working relationships and work with a diverse group of stakeholders, communicating in a clear, concise, timely and effective manner.

Work Activity Components

Title Details
Advice (THIN) (Level 4) Provides advice on threat intelligence activities to help others understand and mitigate vulnerabilities or to respond to security incidents.
Information review (THIN) (Level 4) Contributes to reviewing, ranking and categorising qualitative threat intelligence information.
Reporting (THIN) (Level 4) Creates threat intelligence reports
Source evaluation (THIN) (Level 4) Evaluates the value, usefulness and impact of sources of threat intelligence sources.
Threat intelligence gathering (THIN) (Level 4) Performs threat intelligence gathering tasks. Collates and analyses information for threat intelligence requirements from a variety of sources.
Threat modelling (THIN) (Level 4) Undertakes routine threat modelling tasks. Analyses the significance and implication of process intelligence to identify trends, potential threat sources and their capabilities.
Auditable records (SCAD) (Level 4) For all services and systems within identified remit, maintains auditable records and user documentation. Assists in the preparation and maintenance of other documentation such as business recovery plans, particularly in the data collection and compilation/production/distribution phases of the exercise.
Policies, standards, processes and guidelines (SCAD) (Level 4) Maintains security administration processes, and checks that all requests for support are dealt with according to agreed procedures.
Security advice (SCAD) (Level 4) Provides advice and handles enquiries relating to security, contingency planning and related activities. Acts as subject matter expert for security administration activities.
Violation and security breach (SCAD) (Level 4) Investigates security breaches in accordance with established procedures and security standards, and recommends required actions and support/follows-up to ensure these are implemented. Investigates and reconciles violation reports and logs generated by automated systems. Where appropriate (i.e. involving employees within own organisation) interviews minor offenders and compiles reports and recommendations for management follow-up.
Assessment documentation (VUAS) (Level 4) Documents a full vulnerability assessment and business impact analysis conducted on medium complexity information systems.
Communication and awareness (VUAS) (Level 4) Promotes security awareness and communicates information on security risks and potential business impact to senior business managers and others.
Critical information and technology assets (VUAS) (Level 4) Allocates an impact level to critical information and technology assets should their confidentiality, integrity or availability be breached. Collates and analyses catalogues of information and technology assets for vulnerability assessment.
Risk assessment (VUAS) (Level 4) Produces a risk assessment table to determine the likelihood and impact to an information or technology asset if a vulnerability is exposed to a threat source, assigning a likelihood and impact to determine risk level. Documents the business impact of a vulnerability being breached.
Risk mitigation (VUAS) (Level 4) Delivers risk treatment plans using one or more recognised control sets.
Tools and techniques (VUAS) (Level 4) Contributes to the selection and deployment of vulnerability assessment tools and techniques.
Vulnerability assessment (VUAS) (Level 4) Conducts automated and manual vulnerability assessments and business impact analyses. Creates test cases using in-depth technical analysis of risks and typical vulnerabilities. Assesses effectiveness of security controls for infrastructure and application components, and recommends remedial action.
Vulnerability identification and analysis (VUAS) (Level 4) Assesses the potential vulnerabilities identified against established vulnerability databases.
Career paths and mentoring (PEMT)(Level 4) Coaches colleagues in developing target skills and capabilities in line with team and personal goals.
Empowerment and role model (PEMT) (Level 4) Facilitates effective working relationships between team members. Motivates team members to maintain a high level of performance. Engages with, and empowers team members. Acts as a role model for individuals and team members, setting a standard, acting professionally at all times and working to a professional code of conduct and ethics.
Guidance, performance and feedback (Level 4) Provides direction, support and guidance as necessary, in line with individual's skills and abilities setting appropriate and effective boundaries. Sets achievable goals, monitoring and acknowledging performance and supporting individual and team development. Collects data on individual and team performance. Gives regular feedback to team members and leads them to achieve their full potential.
Team dynamics (PEMT) (Level 4) Integrates staff into teams to perform packages of work, taking account of individual and team capabilities. Considers the importance of skill mix within teams and is sensitive towards team dynamics.
Work allocation, support and delegation (PEMT) (Level 4) Allocates routine tasks and assigns project work to individuals, according to their particular skills, capabilities, and development needs.

Behavioural Skills

Title Details
Ambiguity Comfortable dealing with ambiguity and operating in environments that evolve and change.
Analytical Thinking Acquiring a proper understanding of a problem or situation by breaking it down systematically into its component parts and identifying the relationships between these parts. Selecting the appropriate method/tool to resolve the problem and reflecting critically on the result, so that what is learnt is identified and assimilated.
Attention to Detail Applying specific quality standards to all tasks undertaken to ensure that deliverables are accurate and complete.
Conceptual Thinking Acquiring understanding and insights regarding the underlying issues in complex problems or situations through the development of abstract representations, the identification of patterns and the analysis of hypotheses.
Customer Focus Understanding the needs of the internal or external customer and keeping these in mind when taking actions or making decisions.
Delegation Delegating tasks, responsibilities and authorities effectively.
Follow-up and Monitoring Checking progress against targets, taking action to resolve exceptions/ issues and reporting and escalating where necessary.
Holistic Thinking The ability to place problems in the context of the wider business landscape or area of interest. Understanding how different business functions work together to achieve shared goals.
Influence, Persuasion and Personal Impact Conveying a level of confidence and professionalism when engaging with stakeholders, influencing positively and persuading others to take a specific course of action when not in a position of authority.
Information Acquisition Identifying gaps in the available information required to understand a problem or situation and devising a means of resolving them.
Interacting with People Establishing relationships, contributing to an open culture and maintaining contacts with people from a variety of backgrounds and disciplines. Effective, approachable and sensitive communicator in different communities and cultures. Ability to adapt style and approach to meet the needs of different audiences.
Organisational Awareness Understanding the hierarchy and culture of own, customer, supplier and partner organisations and being able to identify the decision makers and influencers.
Providing Direction Directing others to undertake specified tasks within a defined timescale.
Resilience Demonstrates resilience when working under pressure, displaying a calm and rational approach to the task at hand.
Teamwork Working collaboratively with others to achieve a common goal.

Technical Skills

Title Details Depth
Access Control Systems Any tool or system which provides security access control (i.e. prevents unauthorised access to systems). Proficient in
Analytical Tools Analytical, statistical and machine learning tools appropriate to the organisational environment. Able to apply these tools and techniques to meet the requirements of stakeholders. Proficient in
Application Systems Technical or functional understanding of Commercial Off-the-Shelf (COTS) applications and/or other bespoke software deployed within the organisation in order to provide system configuration, audit, technical, and/or functional support. Familiar with
Big Data The discipline associated with data sets so large and/or complex that traditional data processing applications are inadequate. The data files may include structured, unstructured and/or semi-structured data, such as unstructured text, audio, video, etc. Challenges include analysis, capture, curation, search, sharing, storage, transfer, manipulation, analysis, visualization and information privacy. Aware of
Business Environment The business environment relating to own sphere of work (own organisation and/or closely associated organisations, such as customers, suppliers, partners and competitors), in particular those aspects of the business that the specialism is to support (i.e. localised organisational awareness from a technical perspective). Familiar with
BYOD The policy of permitting employees to bring personally owned mobile devices (laptops, tablets, smart phones etc) to their workplace, and the implications of using those devices to access privileged company information and applications consistent with safeguarding corporate systems and data taking account of security and confidentiality requirements. Also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC). Familiar with
Cloud/Virtualisation The principles and application of cloud/ virtualisation (including ownership, responsibilities and security implications). Use of tools and systems to manage virtualised environments. Familiar with
Configuration Management The discipline that gives precise control over IT assets and components by recording and maintaining information about the 'configuration items', including hardware devices, computer programs, software licences, documentation, network devices, and data centre facilities (virtualised and static). Familiar with
Corporate, Industry and Professional Standards Applying relevant standards, practices, codes, and assessment and certification programmes to the specific organisation or business domain. Familiar with
Cyber Security Concepts The understanding of cyber security concepts and ability to effectively translate and accurately communicate security and risk implications across technical and non-technical stakeholders so that they are understood and applied. Proficient in
Infrastructure Configuration Knowledge and understanding of infrastructure configurations. Familiar with
Infrastructure/System Security The security threats and vulnerabilities that impact and/or emanate from system hardware, software and other infrastructure components, and relevant strategies, controls and activities to prevent, mitigate, detect and resolve security incidents affecting system hardware, software and other infrastructure components. Proficient in
IT Environment The IT environment relating to own sphere of work (own organisation and/or closely associated organisations, such as customers, suppliers, partners), in particular own organisation's technical platforms and those that interface to them through the specialism, including those in closely-related organisations. Proficient in
Middleware Software which forms part of the operating platform infrastructure. Familiar with
National/International Standards Current and emerging standards associated with IT practice nationally and internationally, published by authorities such as IEEE, IEC, BSI, ISO. Familiar with
Network Data Security Network security and threat mitigation, including physical, electronic, firewalling, encryption, access,  and authorisation; protecting data at rest and in transit; defending against viruses and malware; the impact of Big Data; and the integration of robust security controls into enterprise services and policies. Proficient in
Network Traffic Analysis Methods and techniques for the capture of traffic information (packet level) and the forensic analysis of this information into its constituent elements. Familiar with
Networking and Communications The planning and management of the interaction between two or more networking systems, computers or other intelligent devices. Proficient in
Operating Systems System software that controls activities such as input, output, dynamic resource allocation, and error reporting, within the operation of a computer configuration. Proficient in
Operational/Service Architecture Knowledge of the IT/IS infrastructure and the IT applications and service processes used within own organisation, including those associated with sustainability and efficiency. Familiar with
Own Organisation's IT Products and Services The IT products and/or services supplied to internal and external customers by own organisation. Familiar with
Security Software, Tools and Techniques Specialist tools and techniques used in the pursuit of vulnerability management, penetration testing , digital forensics and other security management disciplines for bug-hunting, abstract interpretation and program analysis, binary analysis and reverse-engineering, exploit development, source code analysis, and static and dynamic application security testing (SAST/DAST) etc. Familiar with
Third Party IT Products and Services The IT products and/or services supplied to own organisation by external suppliers. Familiar with

Other Skills

Title Details Depth
Appraisal Techniques Methods and techniques for appraising an individual's performance and potential. Familiar with
Budgets Principles, methods, techniques and tools for the preparation and monitoring of budgets to manage costs and ensure cost-effectiveness and value for money. Aware of
Coaching Techniques Methods and techniques for coaching individuals or groups by a balanced combination of support and direction, which could include use of virtual learning environments plus add-ons to augment feedback specific to work items, workflow or career plans. Familiar with
Disciplinary Issues and Procedures Managing episodes of unsatisfactory behaviour or performance in accordance with appropriate policies and legislative conformance. Includes changes to circumstances, such as sickness, disability and other personal issues. Aware of
Document Management Techniques Methods and techniques for the organisation, storage and version control of information in both paper and electronic formats. Familiar with
Legislation Relevant national and international legislation. Proficient in
Literature Search Methods, techniques and tools for searching and obtaining relevant knowledge from published literature. Proficient in
Network Data Gathering Techniques The selection, implementation and application of network data gathering methods, tools and techniques that are appropriate to the information required and the sources available. Proficient in
Performance Monitoring Identifying, agreeing and monitoring (usually by face-to-face interviews) objectives and deliverables with individuals. Identifying under-performance issues against agreed quality standards and performance criteria. Identifying gaps in capability and causes, disciplinary or ability-related (needing assistance, training or other support). Familiar with
Presentation Techniques Methods and techniques for delivering effective and accessible presentations, either face-to-face or online within various contexts and to a variety of audiences. Familiar with
Process Documentation Techniques Principles, methods and techniques for establishing, documenting and maintaining processes. Aware of
Process Improvement Techniques Methods, tools and techniques to analyse and optimise processes in order to improve the quality of a product or service. Aware of
Project Planning and Control Techniques Methods and techniques associated with planning and monitoring progress of projects. Aware of
Report Writing Techniques Methods and techniques for writing clear, accessible and persuasive reports. Familiar with
Research Techniques Methods, techniques and tools for the systematic discovery, analysis, and reporting of knowledge about all aspects of information systems. Proficient in
Resource Allocation The effective and efficient routine deployment of resources, (but also including reassessment and reallocation in a dynamic multi-project environment), to achieve optimum results. Familiar with
Risk Management Methods and techniques for the assessment and management of business risk. Proficient in
Stakeholder Engagement Establishing relationships, analysing perspectives and managing stakeholders from a variety of backgrounds and disciplines. Adapting stakeholder engagement style to meet the needs of different audiences. The identification of key business stakeholders and an assessment of their level of power and interests, and their perspectives to inform the way(s) in which they should be considered and managed. Aware of
Standards Writing Techniques Principles, methods and techniques for establishing, documenting, and maintaining standards. Aware of
Team Dynamics Knowledge and understanding of the psychological and environmental forces that influence the direction of team behavior and performance and the tools and techniques to improve team cohesion and performance. Aware of
Techniques for Effective Meetings Methods and techniques for running effective meetings and for understanding and influencing the roles played by participants. Aware of
Threat Landscape Knowledge and understanding of the threat landscape, regulatory and legislative requirements and awareness of industry good practice relating to information governance, privacy and security. Familiar with

Training

Title Details
Coaching Concepts, methods and techniques for providing coaching in subject specialisms to individuals or groups (e.g. GROW model).
Data Protection and GDPR Data protection legislation, regulatory framework and compliance, including GDPR (General Data Protection Act).
Local Area Networks Features and characteristics of local area networks relevant to installation and support of hardware and software components.
Mentoring Methods and techniques for providing mentoring support to less experienced individuals.
Protocol Analysis Communication protocol analysis techniques and interpretation of results.
Security Software Understanding the security threats and vulnerabilities that impact and/or emanate from system hardware, software and other infrastructure components and relevant strategies, controls and activities to prevent, mitigate, detect and resolve security incidents. For example access control software like Active Directory (AD).
Service Delivery The service delivery processes: the systems, products, services, hardware and software environment.
Software Configuration Installation, configuration and tuning of applications or systems software.
Wide Area Networks Features and characteristics of networks configured over a wide area i.e. beyond the geographical boundaries of a single site.

Professional Development Activity (PDA)

Title Details PDA Group
Deputising Standing in for supervisor or manager on a temporary basis during periods of absence. Broadening Activities
Gaining Knowledge of Activities of Employing Organisation Developing an understanding of the potentially diverse range of activities (service, governance, administrative, regulatory, commercial, charitable, industrial, etc.) undertaken by the employing organisation. Increasing Knowledge
Gaining Knowledge of IT Concepts and Techniques Undertaking study, learning and, where possible, practice in IT concepts and techniques external to own function. Increasing Knowledge
Job Shadowing and Special Assignments Undertaking temporary periods or secondments in other roles, particularly those that offer a new perspective on own function or exposure to other environments and cultures. Broadening Activities
Negotiating and Influencing Undertaking learning and practice of negotiating with and influencing others. Developing Professional Skills
Participation in Professional Body Affairs Taking an active part in professional body affairs at branch, specialist group, committee or board level. Participation in Professional Activities
Research Assignments Exploring a topic which is not part of own normal responsibilities and presenting findings to colleagues and/or management Increasing Knowledge
Team Leadership Undertaking learning and practice of the skills required to lead teams, including motivation, direction, coaching, delegation, appraisal, counselling and developing others. Developing Professional Skills

Qualification Components

Title Awarding Bodies
FEDIP Advanced Practitioner The Federation for Informatics Professionals
CISSP Certified Information Systems Security Professional (ISC)2 International Information Systems Security Certification Consortium
ISSMP Information Systems Security Management Professional (ISC)2 International Information Systems Security Certification Consortium
Principal Cyber Security Professional (PCSP) The UK Cyber Security Council

The Professional Body Responsible for this job family is BCS. This job role profile was created in collaboration with BCS, using Role Model Plus.

Give Feedback

The Occupational Architecture Project is interactive and dynamic


If you would like to provide feedback on this job role, or the job families, please click the button below.

Give Feedback