Level 3 -
Provide first line cyber security support.
Reference: OCC0865
Status:
SOC 2020 sub unit groups:
IBM, Qufaro, Cap Gemini, Fujitsu, Sandettie, Dimension Data, CyberCrowd, Forgerock, CompTIA, ABFoods Issured, Deloitte, Local Government Association, Global Knowledge
This occupation is found in all sectors where information is held digitally and where that information is an asset that needs to be protected including but not limited to finance, retail, telecoms, health, media, manufacturing and local authorities.
The broad purpose of the occupation is to provide first line cyber security support. This requires individuals to monitor and detect potential security threats and escalate as necessary and to support secure and uninterrupted business operations of an organisation through the implementation of cyber security mechanisms and the application of cyber security procedures and controls. To contribute to the delivery of a security culture across an organisation, understanding vulnerabilities and threats and supporting the development of an organisation's cyber security maturity. To apply procedures and controls to maintain security and control of an organisation, and process security requests ensuring confidentiality, integrity and availability of information stored digitally.
In their daily work, an employee in this occupation interacts with a wide range of stakeholders including colleagues, managers, customers and internal and external suppliers. They would typically work as a member of a team; this may be office based or virtual. The employee will interact with, and influence colleagues and will have working level contact with customers, suppliers and partners in their capacity as an individual contributor.
An employee in this occupation will be responsible for supporting a cyber security function (frequently a Security Operations Centre or Network Operations Centre) working under supervision. The employee will be conducting specific cyber security tasks to defined procedures and standards. Specific cyber security mechanisms and controls that an individual would be required to implement would include: patching software, installing software updates, implementing access control, configuring firewalls, security incident and event management tools (SIEM) tools and protection tools (Anti-virus, Anti-malware, Anti-spam). They will be responsible for their own activities with other resources made available to them as required. As directed, the employee will engage with specific cyber security events. The employee will be expected to work with internal and external stakeholders under general direction. They will use discretion in identifying and responding to complex issues and assignments and will usually receive specific instructions and will have work reviewed at frequent milestones. They will be expected to determine when issues should be escalated to a higher level.
IBM, Qufaro, Cap Gemini, Fujitsu, Sandettie, Dimension Data, CyberCrowd, Forgerock, CompTIA, ABFoods Issured, Deloitte, Local Government Association, Global Knowledge
Apply procedures and controls to maintain security and control of an organisation.
Contribute to the production and development of security culture across an organisation including assisting with the promotion of cyber security awareness programmes, monitoring the effectiveness of cyber security awareness programmes, promoting an effective cyber security culture
Process cyber security helpdesk requests ensuring confidentiality, integrity and availability of digital information, meeting relevant legal and regulatory requirements for example access control requests.
Conduct the installation and maintenance of technical security controls in accordance with relevant procedures and standards.
Monitor, identify, report and escalate information security incidents and events in accordance with relevant procedures and standards.
Administer cryptographic and certificate management activities in accordance with relevant procedures and standards.
Conduct regular review of access rights to digital information assets in accordance with relevant procedures and standards.
Maintain an asset register of controlled environments in accordance with relevant policies, procedures and standards.
Assist with backup and recovery processes in accordance with relevant policies, procedures and standards.
Contribute to documenting the scope and evaluating the results of vulnerability assessments in accordance with management requirements.
Contribute to risk assessments and escalate where appropriate in accordance with relevant procedures and standards.
Contribute to routine threat intelligence gathering tasks.
Document incident and event information and incident, exception and management reports in accordance with relevant policies, procedures and standards.
Contribute towards the production and review of cyber security policies, procedures, standards and guidelines drawing on their experience of applying policies for example - acceptable use, incident management, patching, anti-virus, bring your own device (BYOD), access control, social media, password, data handling and data classification, information technology asset disposal
Monitor cyber security compliance and provide relevant data to auditors if required by the auditor.
Collaborate with people both internally and externally to support secure and uninterrupted business operations of an organisation.
Practice continuous self-learning to keep up to date with industry trends and developments to enhance relevant skills and take responsibility for own professional development.
Monitor and detect potential security threats and escalate in accordance with relevant procedures and standards.
This occupational progression map shows technical occupations that have transferable knowledge and skills.
In this map, the focused occupation is highlighted in yellow. The arrows indicate where transferable knowledge and skills exist between two occupations. This map shows some of the strongest progression links between the focused occupation and other occupations.
It is anticipated that individuals would be required to undertake further learning or training to progress to and from occupations. To find out more about an occupation featured in the progression map, including the learning options available, click the occupation.
Progression decisions have been reached by comparing the knowledge and skills statements between occupational standards, combined with individualised learner movement data.
Digital